Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

[1]  Guoai Xu,et al.  Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks , 2020, IEEE Transactions on Dependable and Secure Computing.

[2]  Athanasios V. Vasilakos,et al.  Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System , 2021, IEEE Internet of Things Journal.

[3]  Athanasios V. Vasilakos,et al.  Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System , 2021, IEEE Internet of Things Journal.

[4]  Dan Zhang,et al.  A survey on attack detection, estimation and control of industrial cyber-physical systems. , 2021, ISA transactions.

[5]  Athanasios V. Vasilakos,et al.  Security and Privacy for Mobile Edge Caching: Challenges and Solutions , 2020, IEEE Wireless Communications.

[6]  Leonardo Babun,et al.  HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks , 2020, IEEE Transactions on Network Science and Engineering.

[7]  Amit Kumar Sikder,et al.  A Survey on Security and Privacy Issues in Modern Healthcare Systems , 2020, ACM Trans. Comput. Heal..

[8]  Leonardo Babun,et al.  Real-time Analysis of Privacy-(un)aware IoT Applications , 2019, Proc. Priv. Enhancing Technol..

[9]  Fallout of SolarWinds hack could last for years , 2020, Emerald Expert Briefings.

[10]  Kary Främling,et al.  Security in product lifecycle of IoT devices: A survey , 2020, J. Netw. Comput. Appl..

[11]  Ashok Kumar Das,et al.  Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.

[12]  Kemal Akkaya,et al.  PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings , 2020, BuildSys@SenSys.

[13]  Amit Kumar Sikder,et al.  Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.

[14]  Athanasios V. Vasilakos,et al.  Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems , 2020, Future Gener. Comput. Syst..

[15]  Nawaf Rasheed Alharbe,et al.  ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY , 2020 .

[16]  Amit Kumar Sikder,et al.  HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).

[17]  Elizabeth S. Bentley,et al.  Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[18]  Leonardo Babun,et al.  USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework , 2020, Journal of Hardware and Systems Security.

[19]  Yan Huang,et al.  Risk Assessment of Private Information Inference for Motion Sensor Embedded IoT Devices , 2020, IEEE Transactions on Emerging Topics in Computational Intelligence.

[20]  Mohammad Zulkernine,et al.  Attacks and Defenses in Short-Range Wireless Technologies for IoT , 2020, IEEE Access.

[21]  Mathy Vanhoef,et al.  Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[22]  Athanasios V. Vasilakos,et al.  LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment , 2020, J. Netw. Comput. Appl..

[23]  Yingjiu Li,et al.  Lightweight Sharable and Traceable Secure Mobile Health System , 2020, IEEE Transactions on Dependable and Secure Computing.

[24]  Engin Kirda,et al.  Kratos: multi-user multi-device-aware access control system for the smart home , 2019, WISEC.

[25]  Leonardo Babun,et al.  A System-level Behavioral Detection Framework for Compromised CPS Devices , 2019, ACM Trans. Cyber Phys. Syst..

[26]  Georg Sigl,et al.  Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks , 2019, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[27]  Amit Kumar Sikder,et al.  A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices , 2019, IEEE Transactions on Mobile Computing.

[28]  Mauro Conti,et al.  Peek-a-boo: i see your smart home activities, even encrypted! , 2018, WISEC.

[29]  Leonardo Babun,et al.  MAD-IoT: Memory Anomaly Detection for the Internet of Things , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).

[30]  Mohammad Zulkernine,et al.  WPA3 Connection Deprivation Attacks , 2019, CRiSIS.

[31]  Leonardo Babun,et al.  USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework , 2019, SecureComm.

[32]  Amit Kumar Sikder,et al.  Aegis: a context-aware security framework for smart home systems , 2019, ACSAC.

[33]  Kemal Akkaya,et al.  HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol , 2019, ACSAC.

[34]  Mohammad Zulkernine,et al.  Bluetooth Low Energy Makes “Just Works” Not Work , 2019, 2019 3rd Cyber Security in Networking Conference (CSNet).

[35]  Amit Kumar Sikder,et al.  HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems , 2019, 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS).

[36]  Mohammad Zulkernine,et al.  Bad-token: denial of service attacks on WPA3 , 2019, SIN.

[37]  Rakesh Kumar,et al.  On cloud security requirements, threats, vulnerabilities and countermeasures: A survey , 2019, Comput. Sci. Rev..

[38]  Quanyan Zhu,et al.  IoT Supply Chain Security: Overview, Challenges, and the Road Ahead , 2019, ArXiv.

[39]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[40]  Leonardo Babun,et al.  Verifying Internet of Things Safety and Security in Physical Spaces , 2019, IEEE Security & Privacy.

[41]  Dirk Timmermann,et al.  Performance Analysis of a Secured BACnet/IP Network , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[42]  Leonardo Babun,et al.  Dynamically detecting USB attacks in hardware: poster , 2019, WiSec.

[43]  Duncan Hodges,et al.  Reconstructing What You Said: Text Inference Using Smartphone Motion , 2019, IEEE Transactions on Mobile Computing.

[44]  Antonio Bucchiarone,et al.  Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era , 2019, Future Internet.

[45]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[46]  Pavol Tanuska,et al.  Serial Communication Protocol With Enhanced Properties–Securing Communication Layer for Smart Sensors Applications , 2019, IEEE Sensors Journal.

[47]  Murtuza Jadliwala,et al.  Light Ears , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[48]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[49]  Mordechai Guri,et al.  aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR) , 2017, Comput. Secur..

[50]  Jason S. Seibel,et al.  MOTION-BASED SIDE-CHANNEL ATTACK ON MOBILE KEYSTROKES , 2019 .

[51]  Anna Volkova,et al.  Security Challenges in Control Network Protocols: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[52]  Mohammad Zulkernine,et al.  Connection Dumping Vulnerability Affecting Bluetooth Availability , 2018, CRiSIS.

[53]  Thaier Hayajneh,et al.  A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3 , 2018, Electronics.

[54]  Amit Kumar Sikder,et al.  IoTDots: A Digital Forensics Framework for Smart Environments , 2018, ArXiv.

[55]  Firdous Kausar,et al.  Security Attacks and Countermeasures on Cloud Assisted IoT Applications , 2018, 2018 IEEE International Conference on Smart Cloud (SmartCloud).

[56]  S. Mohammad Razavizadeh,et al.  Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation , 2018, 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).

[57]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[58]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[59]  Athanasios V. Vasilakos,et al.  A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.

[60]  Mohamed Hamdi,et al.  Secured Distributed IoT Based Supply Chain Architecture , 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).

[61]  Attahiru Sule Alfa,et al.  A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks , 2018, Sensors.

[62]  Mark Mohammad Tehranipoor,et al.  ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain , 2018, ACM Trans. Design Autom. Electr. Syst..

[63]  Leonardo Babun,et al.  Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques , 2018, 2018 IEEE International Conference on Communications (ICC).

[64]  Mordechai Guri,et al.  Bridgeware , 2018, Commun. ACM.

[65]  Kemal Akkaya,et al.  WACA: Wearable-Assisted Continuous Authentication , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[66]  Patrick D. McDaniel,et al.  Sensitive Information Tracking in Commodity IoT , 2018, USENIX Security Symposium.

[67]  Trent Jaeger,et al.  A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications , 2018, ArXiv.

[68]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[69]  Mauro Conti,et al.  Advertising in the IoT Era: Vision and Challenges , 2018, IEEE Communications Magazine.

[70]  Wenyuan Xu,et al.  Risks of trusting the physics of sensors , 2018, Commun. ACM.

[71]  Weiming Zhang,et al.  IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals , 2018, ArXiv.

[72]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..

[73]  James She,et al.  BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities , 2018, IEEE Internet of Things Journal.

[74]  Yi Mu,et al.  Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure , 2018, Personal and Ubiquitous Computing.

[75]  Abdul Hanan Abdullah,et al.  Side channel attacks on smart home systems: A short overview , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[76]  Raimir Holanda Filho,et al.  A Quantitative Model for Dynamic Security Analysis of Wireless Sensor Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[77]  Othman O. Khalifa,et al.  Automated daily human activity recognition for video surveillance using neural network , 2017, 2017 IEEE 4th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA).

[78]  Radek Krejčí,et al.  Security survey of the IoT wireless protocols , 2017, 2017 25th Telecommunication Forum (TELFOR).

[79]  Frank Piessens,et al.  Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.

[80]  Leonardo Babun,et al.  A Survey on Function and System Call Hooking Approaches , 2017, Journal of Hardware and Systems Security.

[81]  Insoo Koo,et al.  Energy exhaustion attacks in wireless networks , 2017, 2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON).

[82]  Wenyuan Xu,et al.  DolphinAttack: Inaudible Voice Commands , 2017, CCS.

[83]  Athanasios V. Vasilakos,et al.  Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.

[84]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[85]  Bharat Bhushan,et al.  Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[86]  Torben Weis,et al.  Identifying TV Channels & On-Demand Videos using Ambient Light Sensors , 2017, Pervasive and Mobile Computing.

[87]  Carles Gomez,et al.  Bluetooth Low Energy Mesh Networks: A Survey , 2017, Sensors.

[88]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[89]  Amit Kumar Sikder,et al.  6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices , 2017, USENIX Security Symposium.

[90]  Kun Yang,et al.  CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain , 2017, ACM Trans. Design Autom. Electr. Syst..

[91]  Suat Özdemir,et al.  Security in internet of things: A survey , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[92]  Georg Carle,et al.  Security Implications of Publicly Reachable Building Automation Systems , 2017, 2017 IEEE Security and Privacy Workshops (SPW).

[93]  Jun Han,et al.  PitchIn: Eavesdropping via Intelligible Speech Reconstruction Using Non-acoustic Sensor Fusion , 2017, 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[94]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[95]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[96]  Benjamin W. P. Ramsey,et al.  Defending Building Automation Systems Using DECOY Networks , 2017, Critical Infrastructure Protection.

[97]  Maruf Pasha,et al.  A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.

[98]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[99]  Amarsinh Vidhate,et al.  Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[100]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[101]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[102]  Shashikant Ghumbre,et al.  A survey on IoT applications, security challenges and counter measures , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[103]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[104]  Raheem A. Beyah,et al.  Rethinking the Honeypot for Cyber-Physical Systems , 2016, IEEE Internet Computing.

[105]  Mordechai Guri,et al.  An optical covert-channel to leak data through an air-gap , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[106]  Romit Roy Choudhury,et al.  Listening through a Vibration Motor , 2016, MobiSys.

[107]  Adi Shamir,et al.  Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[108]  Torben Weis,et al.  Video recognition using ambient light sensors , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[109]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..

[110]  Yu Cheng,et al.  Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.

[111]  Robin Berthier,et al.  An Internet-wide view of ICS devices , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[112]  Yuqiong Sun,et al.  AuDroid: Preventing Attacks on Audio Channels in Mobile Devices , 2015, ACSAC.

[113]  Uma Rathore Bhatt,et al.  Detection and prevention of DDOS attack in WSN for AODV and DSR using battery drain , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[114]  Mark Mohammad Tehranipoor,et al.  Protecting endpoint devices in IoT supply chain , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[115]  Jonathan D. Fuller,et al.  Rogue Z-Wave controllers: A persistent attack channel , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).

[116]  Athanasios V. Vasilakos,et al.  A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..

[117]  Xiaolei Wang,et al.  A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection , 2015, MCS '15.

[118]  Guowei Wu,et al.  Maximizing destructiveness of node capture attack in wireless sensor networks , 2015, The Journal of Supercomputing.

[119]  Ernesto Damiani,et al.  From Security to Assurance in the Cloud , 2015, ACM Comput. Surv..

[120]  Shivam Bhasin,et al.  A survey on hardware trojan detection techniques , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).

[121]  Trang Nguyen,et al.  Using Unrestricted Mobile Sensors to Infer Tapped and Traced User Inputs , 2015, 2015 12th International Conference on Information Technology - New Generations.

[122]  Zhi Xu,et al.  SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones , 2015, CODASPY.

[123]  Neil Savage,et al.  Visualizing sound , 2015, Commun. ACM.

[124]  Panwit Tuwanut,et al.  A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends , 2015 .

[125]  Asmita Kashid,et al.  Security Issues in Internet of Things (IoT): A Survey , 2015 .

[126]  Tobias Zillner,et al.  ZigBee Exploited The good , the bad and the ugly , 2015 .

[127]  Raheem A. Beyah,et al.  Sensory channel threats to Cyber Physical Systems: A wake-up call , 2014, 2014 IEEE Conference on Communications and Network Security.

[128]  Othman O. Khalifa,et al.  Human activity recognition for video surveillance using sequences of postures , 2014, The Third International Conference on e-Technologies and Networks for Development (ICeND2014).

[129]  Xuxian Jiang,et al.  Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.

[130]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[131]  Keijo Haataja,et al.  Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.

[132]  Sajjan G. Shiva,et al.  A survey of cloud computing taxonomies: Rationale and overview , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[133]  Jan-Michael Frahm,et al.  Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions , 2014, CCS.

[134]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[135]  Shih-Hao Hung,et al.  DroidDolphin: a dynamic Android malware detection framework using big data and machine learning , 2014, RACS '14.

[136]  Frédo Durand,et al.  The visual microphone , 2014, ACM Trans. Graph..

[137]  Guevara Noubir,et al.  Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning , 2014, WiSec '14.

[138]  Landon P. Cox,et al.  TaintDroid , 2014 .

[139]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[140]  Raphael Spreitzer,et al.  PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices , 2014, SPSM@CCS.

[141]  Todd R. Andel,et al.  Exploring security in ZigBee networks , 2014, CISR '14.

[142]  Mahmoud Khasawneh,et al.  A Survey on Wi-Fi Protocols: WPA and WPA2 , 2014, SNDS.

[143]  Farrukh Shahzad,et al.  State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.

[144]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[145]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[146]  Guevara Noubir,et al.  Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[147]  John F Miller,et al.  Supply Chain Attack Framework and Attack Patterns , 2013 .

[148]  Ahmed Mubarak Ahmed Al-Haiqi,et al.  Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion , 2013 .

[149]  Jianfeng Wang,et al.  Zigbee light link and its applicationss , 2013, IEEE Wireless Communications.

[150]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[151]  Eric Wustrow,et al.  ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.

[152]  Ramjee Prasad,et al.  Jamming attack: Behavioral modelling and analysis , 2013, Wireless VITAE 2013.

[153]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[154]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[155]  Behrang Fouladi,et al.  Security Evaluation of the Z-Wave Wireless Protocol , 2013 .

[156]  Sungyoung Lee,et al.  A novel intrusion detection framework for wireless sensor networks , 2013, Personal and Ubiquitous Computing.

[157]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[158]  C. Jayakumar,et al.  Node capture attack in Wireless Sensor Network: A survey , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[159]  M. Sasi Kumar,et al.  Detection of jamming style DoS attack in Wireless Sensor Network , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[160]  Jian Wang,et al.  Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[161]  Romit Roy Choudhury,et al.  Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.

[162]  Hao Chen,et al.  On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.

[163]  Celia Gorman,et al.  Counterfeit chips on the rise , 2012 .

[164]  Zhi Xu,et al.  TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.

[165]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[166]  United Arab Emirates,et al.  BLUETOOTH SECURITY THREATS AND SOLUTIONS : A SURVEY , 2012 .

[167]  David G. Holmberg,et al.  BACnet wide area network security threat assessment , 2011 .

[168]  Joe Kissell,et al.  Securing Your Wireless Network , 2011 .

[169]  Patrick Traynor,et al.  (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.

[170]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[171]  C. Muthu Ramya,et al.  Study on ZigBee technology , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[172]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[173]  Alekha Kumar Mishra,et al.  Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[174]  İnan Güler,et al.  A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .

[175]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[176]  Shio Kumar Singh,et al.  A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .

[177]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[178]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[179]  Ying Wang,et al.  Practical Defense against WEP and WPA-PSK Attack for WLAN , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[180]  Hervé Guyennet,et al.  Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.

[181]  John Paul Dunning,et al.  Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.

[182]  Joseph G. Tront,et al.  Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[183]  Radha Poovendran,et al.  Probabilistic Analysis of Covering and Compromise in Node Capture Attacks , 2010 .

[184]  Keijo Haataja,et al.  Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.

[185]  François-Xavier Standaert,et al.  Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.

[186]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[187]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[188]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[189]  Swarup Bhunia,et al.  HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[190]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[191]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[192]  Martin Vuagnoux,et al.  Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.

[193]  Swarup Bhunia,et al.  Security through obscurity: An approach for protecting Register Transfer Level hardware IP , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[194]  Sajal K. Das,et al.  Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.

[195]  Miron Abramovici,et al.  Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.

[196]  Li Xiao,et al.  Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[197]  K. Haataja,et al.  Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[198]  S. Bhunia,et al.  Hardware protection and authentication through netlist level obfuscation , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.

[199]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[200]  Akihiro Tsutsui,et al.  Latest Trends in Home Networking Technologies , 2008, IEICE Trans. Commun..

[201]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[202]  Yuanyuan Zhou,et al.  Designing and Implementing Malicious Hardware , 2008, LEET.

[203]  K. Hypponen,et al.  Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[204]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[205]  Dong Seong Kim,et al.  Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[206]  K. Hypponen,et al.  “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[207]  Andrea Bittau,et al.  BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.

[208]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[209]  J.G. Tront,et al.  Battery Exhaustion Attack Detection with Small Handheld Mobile Computers , 2007, 2007 IEEE International Conference on Portable Information Devices.

[210]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[211]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[212]  Andreas Strikos A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .

[213]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[214]  Miya Knight,et al.  Wireless security - How safe is Z-wave? , 2006 .

[215]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[216]  Daniel C. Nash,et al.  An Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computers , 2005 .

[217]  Ivan Stojmenović,et al.  Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.

[218]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[219]  Markus G. Kuhn,et al.  Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.

[220]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[221]  Sean W. Smith,et al.  A Survey of WPA and 802.11i RSN Authentication Protocols , 2004 .

[222]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[223]  David A. Umphress,et al.  Information leakage from optical emanations , 2002, TSEC.

[224]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[225]  Nicholas Wells,et al.  BusyBox: A Swiss Army Knife for Linux , 2000 .

[226]  Peter Smulders,et al.  The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..

[227]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[228]  Jon Postel,et al.  Internet Standard Subnetting Procedure , 1985, RFC.

[229]  Usn,et al.  Electromagnetic Scattering and Radiation by Arbitrary Configurations of Conducting Bodies and Wires , 2022 .

[230]  Smart to Smarter : Smart Home Systems History , Future and Challenges , 2022 .