Recent Advances and Countermeasures Against Various Attacks in IoT Environment
暂无分享,去创建一个
Nanhay Singh | Suresh Kumar | Siddharth Gautam | Ayasha Malik | S. Gautam | Nanhay Singh | Ayasha Malik | Suresh Kumar
[1] Dogan Ibrahim,et al. Security of the Internet of Things: An Overview , 2016, ICCIS '16.
[2] Bharat Bhushan,et al. Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).
[3] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[4] Bharat Bhushan,et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[5] Davor Svetinovic,et al. A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.
[6] Bharat Bhushan,et al. Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..
[7] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[8] B. Etefia. Routing Protocols for Wireless Sensor Networks , 2004 .
[9] Munam Ali Shah,et al. IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).
[10] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[11] Md. Rafiqul Islam,et al. A Study on the Security Issues in WSN , 2012 .
[12] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[13] Ong Bi Lynn,et al. Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).
[14] G. Sahoo,et al. Man-in-the-middle attack in wireless and computer networking — A review , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).
[15] Alessandro Neri,et al. A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).
[16] G. Sahoo,et al. A comprehensive survey of secure and energy efficient routing protocols and data collection approaches in wireless sensor networks , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[17] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.