The limitations in the state-of-the-art counter-measures against the security threats in H-IoT

[1]  Thar Baker,et al.  A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services , 2020, IEEE Transactions on Industrial Informatics.

[2]  Jalel Ben-Othman,et al.  QoS enhancement with deep learning-based interference prediction in mobile IoT , 2019, Comput. Commun..

[3]  Karl Andersson,et al.  A Survey of Blockchain From the Perspectives of Applications, Challenges, and Opportunities , 2019, IEEE Access.

[4]  Fadi Al-Turjman,et al.  Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning , 2019, IEEE Access.

[5]  Yaser Jararweh,et al.  An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.

[6]  Moayad Aloqaily,et al.  A Blockchain Framework for Securing Connected and Autonomous Vehicles , 2019, Sensors.

[7]  Fadi Al-Turjman,et al.  Energy monitoring in IoT-based ad hoc networks: An overview , 2019, Comput. Electr. Eng..

[8]  Qian He,et al.  Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.

[9]  Yaser Jararweh,et al.  A Mobility Management Architecture for Seamless Delivery of 5G-IoT Services , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[10]  Fadi Al-Turjman,et al.  Nanosensors for the Internet of Nano-Things (IoNT): An Overview , 2019, Internet of Nano-Things and Wireless Body Area Networks (WBAN).

[11]  Fadi Al-Turjman,et al.  Energy-Harvesting Methods for WBAN Applications , 2019, Internet of Nano-Things and Wireless Body Area Networks (WBAN).

[12]  Fadi Al-Turjman,et al.  Internet of Nano-Things (IoNT) & WBAN , 2019, Internet of Nano-Things and Wireless Body Area Networks (WBAN).

[13]  Hector Marco-Gisbert,et al.  Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack , 2019, Applied Sciences.

[14]  Moayad Aloqaily,et al.  Reinforcing the Edge: Autonomous Energy Management for Mobile Device Clouds , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[15]  Yousaf Bin Zikria,et al.  Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution , 2019, Sensors.

[16]  Alexandru Lavric,et al.  Long Range SigFox Communication Protocol Scalability Analysis Under Large-Scale, High-Density Conditions , 2019, IEEE Access.

[17]  Sherali Zeadally,et al.  A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..

[18]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[19]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[20]  Yaser Jararweh,et al.  Exploring Computing at the Edge: A Multi-Interface System Architecture Enabled Mobile Device Cloud , 2018, 2018 IEEE 7th International Conference on Cloud Networking (CloudNet).

[21]  Rizwan Aslam Butt,et al.  Bio‐inspired routing protocol for WSN‐based smart grid applications in the context of Industry 4.0 , 2018, Trans. Emerg. Telecommun. Technol..

[22]  Kaiyu Wan,et al.  Context-Based Security and Privacy for Healthcare IoT , 2018, 2018 IEEE International Conference on Smart Internet of Things (SmartIoT).

[23]  Cong Pu,et al.  A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation , 2018, IEEE Systems Journal.

[24]  M. Rmayti,et al.  Graph-based wormhole attack detection in mobile ad hoc networks (MANETs) , 2018, 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ).

[25]  Byung-Seo Kim,et al.  Design of MAC Layer Resource Allocation Schemes for IEEE 802.11ax: Future Directions , 2018 .

[26]  Bo Cheng,et al.  Proactive personalized services through fog-cloud computing in large-scale IoT-based healthcare application , 2017, China Communications.

[27]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[28]  Muhammad Nasir Mumtaz Bhutta,et al.  Wormhole attack detection in routing protocol for low power lossy networks , 2017, 2017 International Conference on Information and Communication Technologies (ICICT).

[29]  Wei Xiang,et al.  Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.

[30]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[31]  Johan Pouwelse,et al.  TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..

[32]  Prachi Shukla,et al.  ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).

[33]  Ali Dorri,et al.  An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.

[34]  Mohamad Yusof Darus,et al.  Integration of wireless sensor network and Web of Things: Security perspective , 2017, 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC).

[35]  Muhammad Faheem,et al.  Capacity and spectrum-aware communication framework for wireless sensor network-based smart grid applications , 2017, Comput. Stand. Interfaces.

[36]  Muhammad Faheem,et al.  Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0 , 2017, Appl. Soft Comput..

[37]  Luca Vollero,et al.  LoRaWAN as an e-Health Communication Technology , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[38]  Leila Ben Saad,et al.  An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[39]  Sudhir K. Routray,et al.  Issues and challenges in healthcare narrowband IoT , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).

[40]  Tricha Anjali,et al.  Mitigating selective Gray Hole Attack in wireless multi-hop network , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[41]  Rupinder Singh,et al.  WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks , 2016, Mob. Inf. Syst..

[42]  P. Samundiswary,et al.  Wireless body area network security issues — Survey , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[43]  Mohammed Feham,et al.  Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).

[44]  Muhammad Faheem,et al.  EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks , 2015, J. Netw. Comput. Appl..

[45]  Mianxiong Dong,et al.  PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs , 2015, Sensors.

[46]  Avijit Mathur,et al.  Healthcare WSN: Cluster Elections and Selective Forwarding Defense , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[47]  Mei-Ju Su,et al.  A cloud based Bluetooth Low Energy tracking system for dementia patients , 2015, 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU).

[48]  Tarunpreet Bhatia,et al.  Wormhole and Sybil attack in WSN: A review , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[49]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[50]  V. Parthasarathy,et al.  A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment , 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR).

[51]  Yi Mu,et al.  Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..

[52]  Rabiah Ahmad,et al.  Surveying the Wireless Body Area Network in the realm of wireless communication , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[53]  Ali Modirkhazeni,et al.  Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.

[54]  Majid Khabbazian,et al.  Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[55]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[56]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[57]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[58]  Architectures and Frameworks for Developing and Applying Blockchain Technology , 2019, Advances in Systems Analysis, Software Engineering, and High Performance Computing.

[59]  Sanjeev J. Wagh,et al.  Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust , 2018, Cluster Computing.

[60]  E. Soler,et al.  Future Generation Computer Systems , 2018 .

[61]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[62]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[63]  Brijendra Kumar Joshi,et al.  A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[64]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.