-
1
-
-
84880874867
-
Survey of routing attacks and countermeasures
-
Abdelaziz, A.K., Nafaa, M., Salim, G., 2013. Survey of routing attacks and countermeasures. In: Proceedings of the 15th International Conference on Computer Modelling and Simulation (UKSim). 693-698.
-
(2013)
Proceedings of the 15th International Conference on Computer Modelling and Simulation (UKSim)
, pp. 693-698
-
-
Abdelaziz, A.K.1
Nafaa, M.2
Salim, G.3
-
3
-
-
84994405759
-
An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing
-
Ontario, Canada
-
D. Airehrour, and J. Gutierrez An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing Ontario, Canada CONF-IRM 2015 2015
-
(2015)
CONF-IRM 2015
-
-
Airehrour, D.1
Gutierrez, J.2
-
4
-
-
70449572816
-
A novel coding scheme to implement signature based IDS in IP based Sensor Networks
-
S.O. Amin, M.S. Siddiqui, C.S. Hong, and J. Choe A novel coding scheme to implement signature based IDS in IP based Sensor Networks Integr Netw Manag-Work, 2009 IM'09 IFIP/IEEE Int Symp 2009 269 274
-
(2009)
Integr Netw Manag-Work, 2009 IM'09 IFIP/IEEE Int Symp
, pp. 269-274
-
-
Amin, S.O.1
Siddiqui, M.S.2
Hong, C.S.3
Choe, J.4
-
5
-
-
0002380073
-
Tamper resistance: A cautionary note Oakland, California
-
Anderson, R., Kuhn, M., 1996. Tamper resistance: a cautionary note Oakland, California. Present Proceedings of the 2nd Conf Proc Second USENIX Workshop Electron Commer, 2.
-
(1996)
Present Proceedings of the 2nd Conf Proc Second USENIX Workshop Electron Commer
, pp. 2
-
-
Anderson, R.1
Kuhn, M.2
-
6
-
-
84883406171
-
The impact of rank attack on network topology of routing protocol for low-power and lossy networks
-
L. Anhtuan, J. Loo, A. Lasebae, A. Vinel, C. Yue, and M. Chai The impact of rank attack on network topology of routing protocol for low-power and lossy networks Sens. J. IEEE 13 2013 3685 3692
-
(2013)
Sens. J. IEEE
, vol.13
, pp. 3685-3692
-
-
Anhtuan, L.1
Loo, J.2
Lasebae, A.3
Vinel, A.4
Yue, C.5
Chai, M.6
-
7
-
-
84878641061
-
Two-way acknowledgment-based trust framework for wireless sensor networks
-
X. Anita, J. Martin Leo Manickam, and M.A. Bhagyaveni Two-way acknowledgment-based trust framework for wireless sensor networks Int J. Distrib. Sens. Netw. 2013 2013 14
-
(2013)
Int J. Distrib. Sens. Netw.
, vol.2013
, pp. 14
-
-
Anita, X.1
Manickam, J.M.L.2
Bhagyaveni, M.A.3
-
11
-
-
84919359535
-
A lightweight trust management based on Bayesian and Entropy for wireless sensor networks
-
S. Che, R. Feng, X. Liang, and X. Wang A lightweight trust management based on Bayesian and Entropy for wireless sensor networks Secur Commun Netw vol. 8 2015 168 175
-
(2015)
Secur Commun Netw
, vol.8
, pp. 168-175
-
-
Che, S.1
Feng, R.2
Liang, X.3
Wang, X.4
-
12
-
-
77958063894
-
Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks
-
M. Cheng, G. Xuan, and C. Lin Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks IEEE Trans. Wirel. Commun. 8 2009 3770 3779
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, pp. 3770-3779
-
-
Cheng, M.1
Xuan, G.2
Lin, C.3
-
13
-
-
84881466192
-
Case Study of a Black Hole Attack on LoWPAN-RPL
-
Rome, Italy (August 2012)
-
K. Chugh, L. Aboubaker, and J. Loo Case Study of a Black Hole Attack on LoWPAN-RPL Rome, Italy (August 2012) Proc Sixth Int Conf Emerg Secur Inf, Syst Technol (SECURWARE) 2012 157 162
-
(2012)
Proc Sixth Int Conf Emerg Secur Inf, Syst Technol (SECURWARE)
, pp. 157-162
-
-
Chugh, K.1
Aboubaker, L.2
Loo, J.3
-
18
-
-
84923224400
-
An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications
-
J. Duan, D. Gao, D. Yang, C.H. Foh, and H.-H. Chen An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications IEEE Internet Things J. 1 2014 58 69
-
(2014)
IEEE Internet Things J.
, vol.1
, pp. 58-69
-
-
Duan, J.1
Gao, D.2
Yang, D.3
Foh, C.H.4
Chen, H.-H.5
-
20
-
-
84969158272
-
-
December 2
-
Ericsson. (2011, December 2, 2014). More than 50 billion connected devices: Driving forces. Available: 'http://www.akos-rs.si/files/Telekomunikacije/Digitalna-agenda/Internetni-protokol-Ipv6/More-than-50-billion-connected-devices.pdf'
-
(2011)
More Than 50 Billion Connected Devices: Driving Forces
-
-
Ericsson1
-
22
-
-
84911882720
-
An incentive mechanism based on game theory for trust management
-
R. Feng, S. Che, X. Wang, and J. Wan An incentive mechanism based on game theory for trust management Secur Commun Netw vol. 7 2014 2318 2325
-
(2014)
Secur Commun Netw
, vol.7
, pp. 2318-2325
-
-
Feng, R.1
Che, S.2
Wang, X.3
Wan, J.4
-
23
-
-
84908649230
-
Study on sinkhole attacks in wireless Ad hoc networks
-
Gagandeep, and Aashima Study on sinkhole attacks in wireless Ad hoc networks Int J. Comput. Sci. Eng. (IJCSE) 4 2012 1078 1084
-
(2012)
Int J. Comput. Sci. Eng. (IJCSE)
, vol.4
, pp. 1078-1084
-
-
Gagandeep1
Aashima2
-
24
-
-
3042598736
-
-
Basil Blackwell Oxford, England, UK
-
D. Gambetta Can we trust trust? 1988 Basil Blackwell Oxford, England, UK
-
(1988)
Can We Trust Trust?
-
-
Gambetta, D.1
-
25
-
-
84918542426
-
BeTrust: A dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks
-
Y. Gao, and W. Liu BeTrust: a dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks J. Sens. 2014 2014 1 10
-
(2014)
J. Sens.
, vol.2014
, pp. 1-10
-
-
Gao, Y.1
Liu, W.2
-
26
-
-
84945296761
-
Taxonomy and Holistic Detection of Security Attacks in MANETs
-
S. Khan, J. Lloret Mauri, editors. Auerbach Publications Boca Raton, FL
-
P. García-Teodoro, L. Sánchez-Casado, and G. Maciá-Fernández Taxonomy and Holistic Detection of Security Attacks in MANETs S. Khan, J. Lloret Mauri, editors. Security for multihop wireless networks 2014 Auerbach Publications Boca Raton, FL 3 11
-
(2014)
Security for Multihop Wireless Networks
, pp. 3-11
-
-
García-Teodoro, P.1
Sánchez-Casado, L.2
Maciá-Fernández, G.3
-
29
-
-
84911987280
-
Network-layer security for the Internet of Things using TinyOS and BLIP
-
J. Granjal, E. Monteiro, and J.S. Silva Network-layer security for the Internet of Things using TinyOS and BLIP Int Journal Commun Syst vol. 27 2014 1938 1963
-
(2014)
Int Journal Commun Syst
, vol.27
, pp. 1938-1963
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
30
-
-
67650697114
-
Why is IPSec a viable option for wireless sensor networks
-
J. Granjal, R. Silva, E. Monteiro, J. Sa Silva, and F. Boavida Why is IPSec a viable option for wireless sensor networks Mob Ad Hoc Sens Syst, 2008 MASS 2008 5th IEEE Int Conf 2008 802 807
-
(2008)
Mob Ad Hoc Sens Syst, 2008 MASS 2008 5th IEEE Int Conf
, pp. 802-807
-
-
Granjal, J.1
Silva, R.2
Monteiro, E.3
Sa Silva, J.4
Boavida, F.5
-
31
-
-
84878505783
-
ESWC: Efficient scheduling for the mobile sink in wireless sensor networks with delay constraint
-
Y. Gu, Y. Ji, J. Li, and B. Zhao ESWC: efficient scheduling for the mobile sink in wireless sensor networks with delay constraint IEEE Trans Parallel Distrib Syst 24 2013 1310 1320
-
(2013)
IEEE Trans Parallel Distrib Syst
, vol.24
, pp. 1310-1320
-
-
Gu, Y.1
Ji, Y.2
Li, J.3
Zhao, B.4
-
32
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener Comput Syst 29 2013 1645 1660
-
(2013)
Future Gener Comput Syst
, vol.29
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
33
-
-
84899067846
-
Towards context-aware smart mechatronics networks: Integrating swarm intelligence and ambient intelligence
-
A. Gupta, O.J. Pandey, M. Shukla, A. Dadhich, A. Ingle, and P. Gawande Towards context-aware smart mechatronics networks: integrating swarm intelligence and ambient intelligence Issues Challenges Intell Comput Tech (ICICT), 2014 Int Conf 2014 64 69
-
(2014)
Issues Challenges Intell Comput Tech (ICICT), 2014 Int Conf
, pp. 64-69
-
-
Gupta, A.1
Pandey, O.J.2
Shukla, M.3
Dadhich, A.4
Ingle, A.5
Gawande, P.6
-
34
-
-
84904998176
-
Performance analysis of DYMO and DSR protocols under variation of DSSS rate
-
S. Hakak, S. Abd Latif, G. Gilkar, and M.K. Alam Performance analysis of DYMO and DSR protocols under variation of DSSS rate Inform. Electron Vision (ICIEV), 2014 Int. Conf. 2014 1 6
-
(2014)
Inform. Electron Vision (ICIEV), 2014 Int. Conf.
, pp. 1-6
-
-
Hakak, S.1
Abd Latif, S.2
Gilkar, G.3
Alam, M.K.4
-
36
-
-
84908448624
-
Security protocols and privacy issues into 6LoWPAN stack: A synthesis
-
C. Hennebert, and J. Dos Santos Security protocols and privacy issues into 6LoWPAN stack: a synthesis Internet Things J. IEEE 1 2014 384 398
-
(2014)
Internet Things J. IEEE
, vol.1
, pp. 384-398
-
-
Hennebert, C.1
Dos Santos, J.2
-
37
-
-
1542317831
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
-
Y. Hu, A. Perrig, and D. Johnson Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ACM Workshop Wirel Secur (WiSe) 2003 30 40
-
(2003)
ACM Workshop Wirel Secur (WiSe)
, pp. 30-40
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
39
-
-
84896743669
-
Tailoring end-to-end IP security protocols to the Internet of Things
-
R. Hummen, H. Wirtz, J.H. Ziegeldorf, J. Hiller, and K. Wehrle Tailoring end-to-end IP security protocols to the Internet of Things Netw Protoc (ICNP), 2013 21st IEEE Int Conf 2013 1 10
-
(2013)
Netw Protoc (ICNP), 2013 21st IEEE Int Conf
, pp. 1-10
-
-
Hummen, R.1
Wirtz, H.2
Ziegeldorf, J.H.3
Hiller, J.4
Wehrle, K.5
-
40
-
-
84994392828
-
-
December, 2014, December 1
-
Internet Engineering Task Force (IETF). (December, 2014, December 1, 2014). IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch). Available: 'https://datatracker.ietf.org/wg/6tisch/charter/'
-
(2014)
IPv6 over the TSCH Mode of IEEE 802.15.4e (6tisch)
-
-
-
41
-
-
85051578985
-
IETF Standardization in the Field of the Internet of Things (IoT): A Survey
-
I. Ishaq, D. Carels, G. Teklemariam, J. Hoebeke, F. Abeele, E. Poorter, and et al. IETF Standardization in the Field of the Internet of Things (IoT): A Survey J. Sens. Actuator Netw. 2 2013 235 287
-
(2013)
J. Sens. Actuator Netw.
, vol.2
, pp. 235-287
-
-
Ishaq, I.1
Carels, D.2
Teklemariam, G.3
Hoebeke, J.4
Abeele, F.5
Poorter, E.6
-
42
-
-
84923044561
-
Security Issues in Mobile Ad Hoc Network
-
ed S. Khan, A.-S.K. Pathan, editors. Springer-Verlag Berlin Heidelberg Heidelberg, Germany
-
N. Islam, and Z.A. Shaikh Security Issues in Mobile Ad Hoc Network ed S. Khan, A.-S.K. Pathan, editors. Wireless Networks and Security: Issues, Challenges and Research Trends 2013 Springer-Verlag Berlin Heidelberg Heidelberg, Germany 49 56
-
(2013)
Wireless Networks and Security: Issues, Challenges and Research Trends
, pp. 49-56
-
-
Islam, N.1
Shaikh, Z.A.2
-
46
-
-
84891714668
-
Denial-of-Service detection in 6LoWPAN based Internet of Things
-
P. Kasinathan, C. Pastrone, M. Spirito, and M. Vinkovits Denial-of-Service detection in 6LoWPAN based Internet of Things IEEE 9th Int. Conf. Wirel Mob Comput, Netw Commun (WiMob) 2013 600 607
-
(2013)
IEEE 9th Int. Conf. Wirel Mob Comput, Netw Commun (WiMob)
, pp. 600-607
-
-
Kasinathan, P.1
Pastrone, C.2
Spirito, M.3
Vinkovits, M.4
-
50
-
-
84861362789
-
Optimal function computation in directed and undirected graphs
-
H. Kowshik, and P.R. Kumar Optimal function computation in directed and undirected graphs IEEE Trans. Inf. Theory 58 2012 3407 3418
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, pp. 3407-3418
-
-
Kowshik, H.1
Kumar, P.R.2
-
51
-
-
85152513247
-
6LoWPAN security: Adding compromise resilience to the 802.15.4 security sublayer Zurich, Switzerland
-
Krentz, K.-F., Rafiee, H., Meinel, C., 2013. 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer Zurich, Switzerland. Present Proc Int Workshop Adapt Secur.
-
(2013)
Present Proc Int Workshop Adapt Secur
-
-
Krentz, K.-F.1
Rafiee, H.2
Meinel, C.3
-
52
-
-
84865658341
-
6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach
-
A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach Int. J. Commun. Syst. 25 2012 1189 1212
-
(2012)
Int. J. Commun. Syst.
, vol.25
, pp. 1189-1212
-
-
Le, A.1
Loo, J.2
Lasebae, A.3
Aiash, M.4
Luo, Y.5
-
53
-
-
84881125351
-
Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks
-
H. Liu, X. Chu, Y.-W. Leung, and R. Du Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks IEEE Trans. Parallel. Distrib. Syst. 24 2013 1783 1796
-
(2013)
IEEE Trans. Parallel. Distrib. Syst.
, vol.24
, pp. 1783-1796
-
-
Liu, H.1
Chu, X.2
Leung, Y.-W.3
Du, R.4
-
54
-
-
84875152554
-
A routing protocol based on energy and link quality for Internet of Things applications
-
Basel Switzerland
-
K. Machado, D. Rosário, E. Cerqueira, A.A.F. Loureiro, A. Neto, and J.N. d Souza A routing protocol based on energy and link quality for Internet of Things applications Sensors 13 2013 Basel Switzerland 1942 1964
-
(2013)
Sensors
, vol.13
, pp. 1942-1964
-
-
Machado, K.1
Rosário, D.2
Cerqueira, E.3
Loureiro, A.A.F.4
Neto, A.5
Souza, J.N.D.6
-
55
-
-
84904195643
-
A Study of RPL DODAG Version Attacks
-
A. Sperotto, G. Doyen, S. Latré, M. Charalambides, B. Stiller, editors. Springer Berlin Heidelberg
-
A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder A Study of RPL DODAG Version Attacks A. Sperotto, G. Doyen, S. Latré, M. Charalambides, B. Stiller, editors. Monitoring and Securing Virtualized Networks and Services vol. 8508 2014 Springer Berlin Heidelberg 92 104
-
(2014)
Monitoring and Securing Virtualized Networks and Services
, vol.8508
, pp. 92-104
-
-
Mayzaud, A.1
Sehgal, A.2
Badonnel, R.3
Chrisment, I.4
Schönwälder, J.5
-
56
-
-
84994407706
-
-
September 13, 2014
-
Mc Afee Labs. (2014, September 13, 2014). 2013 Threats Predictions. Available: 'http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2013.pdf'
-
(2014)
2013 Threats Predictions
-
-
-
57
-
-
33646163685
-
-
Heidelberg: Springer Berlin Heidelberg Berlin
-
D. Melaye, and Y. Demazeau Bayesian Dynamic Trust Model vol. 3690 2005 Heidelberg: Springer Berlin Heidelberg Berlin 480 489
-
(2005)
Bayesian Dynamic Trust Model
, vol.3690
, pp. 480-489
-
-
Melaye, D.1
Demazeau, Y.2
-
58
-
-
19944366933
-
A MAC protocol to reduce sensor network energy consumption using a wakeup radio
-
M.J. Miller, and N.H. Vaidya A MAC protocol to reduce sensor network energy consumption using a wakeup radio IEEE Trans Mob Comput 4 2005 228 242
-
(2005)
IEEE Trans Mob Comput
, vol.4
, pp. 228-242
-
-
Miller, M.J.1
Vaidya, N.H.2
-
62
-
-
79551619215
-
-
IETF RFC 5673
-
Pister, K., Thubert, P., Phinney, T., (2009), Industrial Routing Requirements in Low-Power and Lossy Networks. IETF RFC 5673. Available: 'https://tools.ietf.org/html/rfc5673'
-
(2009)
Industrial Routing Requirements in Low-Power and Lossy Networks
-
-
Pister, K.1
Thubert, P.2
Phinney, T.3
-
64
-
-
44949276843
-
Restating the foundation of information security
-
D.B. Parker Restating the foundation of information security Comput Audit Update 1991 1991 2 15
-
(1991)
Comput Audit Update
, vol.1991
, pp. 2-15
-
-
Parker, D.B.1
-
65
-
-
84994391892
-
-
arXiv Prepr arXiv:1108.0883v1 [gr-qc]
-
H. Perrey, M. Landsmann, O. Ugus, T.C. Schmidt, and M. Wählisch TRAIL: Topology Authentication in RPL arXiv Prepr arXiv:1108.0883v1 [gr-qc] 1312 2013 0984
-
(2013)
TRAIL: Topology Authentication in RPL
, vol.1312
, pp. 0984
-
-
Perrey, H.1
Landsmann, M.2
Ugus, O.3
Schmidt, T.C.4
Wählisch, M.5
-
66
-
-
33748469604
-
-
ed. Florida Atlantic University S. Huang, D. MacCallum, D.Z. Du, editors. Springer Boca Raton, FL
-
M.O. Pervaiz, M. Cardei, and J. Wu Routing Security in Ad Hoc Wireless Networks ed. Florida Atlantic University S. Huang, D. MacCallum, D.Z. Du, editors. 2005 Springer Boca Raton, FL
-
(2005)
Routing Security in Ad Hoc Wireless Networks
-
-
Pervaiz, M.O.1
Cardei, M.2
Wu, J.3
-
68
-
-
84901931524
-
Effective neural network-based node localisation scheme for wireless sensor networks
-
C. Po-Jen, and J. Yi-Jun Effective neural network-based node localisation scheme for wireless sensor networks Wirel. Sens. Syst. IET 4 2014 97 103
-
(2014)
Wirel. Sens. Syst. IET
, vol.4
, pp. 97-103
-
-
Po-Jen, C.1
Yi-Jun, J.2
-
69
-
-
84904409217
-
-
R. Giuliano, F. Mazzenga, A. Neri, and A.M. Vegni, Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals, pp. 257-262.
-
Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals
, pp. 257-262
-
-
Giuliano, R.1
Mazzenga, F.2
Neri, A.3
Vegni, A.M.4
-
71
-
-
84867766892
-
Secure communication for the Internet of Things - A comparison of link-layer security and IPsec for 6LoWPAN
-
S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN Secur. Commun Netw. 2012
-
(2012)
Secur. Commun Netw.
-
-
Raza, S.1
Duquennoy, S.2
Höglund, J.3
Roedig, U.4
Voigt, T.5
-
72
-
-
84911865485
-
Secure communication for the Internet of Things - A comparison of link-layer security and IPsec for 6LoWPAN
-
S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN Secur. Commun Netw. 7 2014 2654 2668
-
(2014)
Secur. Commun Netw.
, vol.7
, pp. 2654-2668
-
-
Raza, S.1
Duquennoy, S.2
Höglund, J.3
Roedig, U.4
Voigt, T.5
-
73
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig Securing communication in 6LoWPAN with compressed IPsec Distrib. Comput. Sens. Syst. Work (DCOSS) 2011 Int. Conf. 2011 1 8
-
(2011)
Distrib. Comput. Sens. Syst. Work (DCOSS) 2011 Int. Conf.
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
74
-
-
84883314073
-
Lithe: Lightweight Secure CoAP for the Internet of Things
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, T. Voigt, d o t Akademin för innovation, and et al. Lithe: lightweight Secure CoAP for the Internet of Things IEEE Sensors Journal 13 2013 3711 3720
-
(2013)
IEEE Sensors Journal
, vol.13
, pp. 3711-3720
-
-
Akademin för innovation d o t1
Raza, S.2
Shafagh, H.3
Hewage, K.4
Hummen, R.5
Voigt, T.6
-
76
-
-
79955712919
-
Key management systems for sensor networks in the context of the Internet of Things
-
R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos Key management systems for sensor networks in the context of the Internet of Things Comput Electr Eng 37 2011 147 159
-
(2011)
Comput Electr Eng
, vol.37
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
78
-
-
84899995793
-
Energy-efficient probabilistic routing algorithm for internet of things
-
P. Sang-Hyun, C. Seungryong, and L. Jung-Ryun Energy-efficient probabilistic routing algorithm for internet of things J. Appl Math 2014 2014
-
(2014)
J. Appl Math
, vol.2014
-
-
Sang-Hyun, P.1
Seungryong, C.2
Jung-Ryun, L.3
-
79
-
-
15244339622
-
An authenticated routing protocol for secure Ad Hoc Networks
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer An authenticated routing protocol for secure Ad Hoc Networks IEEE J. Sel Areas Commun. Wirel Ad hoc Netw. 23 2005 598 610 (special issue)
-
(2005)
IEEE J. Sel Areas Commun. Wirel Ad Hoc Netw.
, vol.23
, pp. 598-610
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
80
-
-
84994438131
-
-
Shelby, Z., Chakrabarti, S., Nordmark, E., Bormann, C., 2012. Available: 'https://tools.ietf.org/html/rfc6775'
-
(2012)
-
-
Shelby, Z.1
Chakrabarti, S.2
Nordmark, E.3
Bormann, C.4
-
81
-
-
58149526169
-
-
F.L. Boca Raton, editor. Second Edition CRC Press
-
S.K. Sarkar, T.G. Basavaraju, and C. Puttamadappa Ad Hoc mobile wireless networks principles, protocols, and applications F.L. Boca Raton, editor. Second Edition 2013 CRC Press
-
(2013)
Ad Hoc Mobile Wireless Networks Principles, Protocols, and Applications
-
-
Sarkar, S.K.1
Basavaraju, T.G.2
Puttamadappa, C.3
-
85
-
-
84655170952
-
Cross-layer optimization of correlated data gathering in wireless sensor networks
-
H. Shibo, C. Jiming, D.K.Y. Yau, and S. Youxian Cross-layer optimization of correlated data gathering in wireless sensor networks IEEE Trans. Mob. Comput. 11 2012 1678 1691
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, pp. 1678-1691
-
-
Shibo, H.1
Jiming, C.2
Yau, D.K.Y.3
Youxian, S.4
-
89
-
-
84893447745
-
-
13.09.14
-
Sophos Limited, 2013. Security Threat Report 2013. 1.13. (13.09.14) Available: 'https://www.sophos.com/de-de/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdf'
-
(2013)
Security Threat Report 2013
, pp. 113
-
-
-
90
-
-
84922515896
-
-
Sophos Limited, 2014. Security Threat Report. 2-22. Available: 'http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf'
-
(2014)
Security Threat Report
, pp. 2-22
-
-
-
91
-
-
84994391658
-
Entropy Trust based Approach against IP spoofing attacks in network
-
B. Sovan, and G. Arnab Entropy Trust based Approach against IP spoofing attacks in network Int Journal Comput Appl 67 2013
-
(2013)
Int Journal Comput Appl
, vol.67
-
-
Sovan, B.1
Arnab, G.2
-
92
-
-
84994392792
-
-
November 25
-
Spansion. (2014, November 25). ZigBee mesh networks. Available: 'http://core.spansion.com/article/contextual-computing-simplifies-iot/#.VG5sfskXJ8E'
-
(2014)
ZigBee Mesh Networks
-
-
-
93
-
-
84925325341
-
Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks
-
P. Swaruba, and V.R. Ganesh Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks Int. Conf. Inf. Commun. Embed Syst. (ICICES) 2014 1 7
-
(2014)
Int. Conf. Inf. Commun. Embed Syst. (ICICES)
, pp. 1-7
-
-
Swaruba, P.1
Ganesh, V.R.2
-
94
-
-
84984969085
-
-
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., Richardson, M., 2014. A Secur Threat Anal Routing Protoc Low-power lossy Netw (RPL).
-
(2014)
A Secur Threat Anal Routing Protoc Low-Power Lossy Netw (RPL)
-
-
Tsao, T.1
Alexander, R.2
Dohler, M.3
Daza, V.4
Lozano, A.5
Richardson, M.6
-
97
-
-
77953725972
-
-
IETF RFC 5548
-
Watteyne, T., Berkeley, U.C., Winter, T., Barthel, D., 2009. Routing Requirements for Urban Low-Power and Lossy Networks. IETF RFC 5548. Available: 'https://tools.ietf.org/html/rfc5548'
-
(2009)
Routing Requirements for Urban Low-Power and Lossy Networks
-
-
Watteyne, T.1
Berkeley, U.C.2
Winter, T.3
Barthel, D.4
-
98
-
-
84964958468
-
-
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., et al., 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Available: 'https://tools.ietf.org/html/rfc6550'
-
(2012)
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Hui, J.4
Kelsey, R.5
Levis, P.6
-
99
-
-
84884229742
-
Routing attacks and countermeasures in the RPL-based internet of things
-
L. Wallgren, S. Raza, and T. Voigt Routing attacks and countermeasures in the RPL-based internet of things Int. J. Distrib. Sens. Netw. 2013 2013 11
-
(2013)
Int. J. Distrib. Sens. Netw.
, vol.2013
, pp. 11
-
-
Wallgren, L.1
Raza, S.2
Voigt, T.3
-
101
-
-
79957785921
-
Information potential fields navigation in wireless Ad-Hoc sensor networks
-
W. Wei, and Y. Qi Information potential fields navigation in wireless Ad-Hoc sensor networks Sensors 11 2011 4794
-
(2011)
Sensors
, vol.11
, pp. 4794
-
-
Wei, W.1
Qi, Y.2
-
103
-
-
84911967925
-
GI/Geom/1 queue based on communication model for mesh networks
-
W. Wei, Q. Xu, L. Wang, X.H. Hei, P. Shen, W. Shi, and et al. GI/Geom/1 queue based on communication model for mesh networks Int J. Commun. Syst. 27 2014 3013 3029
-
(2014)
Int J. Commun. Syst.
, vol.27
, pp. 3013-3029
-
-
Wei, W.1
Xu, Q.2
Wang, L.3
Hei, X.H.4
Shen, P.5
Shi, W.6
-
104
-
-
84946687086
-
Routing in wireless sensor network using artificial bee colony algorithm
-
Z. Wei, and L. Di Routing in wireless sensor network using artificial bee colony algorithm Int. Conf. Wirel. Commun. Sens. Netw. (WCSN) 2014 280 284
-
(2014)
Int. Conf. Wirel. Commun. Sens. Netw. (WCSN)
, pp. 280-284
-
-
Wei, Z.1
Di, L.2
-
105
-
-
36849010124
-
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
-
Y. Xiao, X.S. Shen, D.-Z. Du, editors. Springer Science
-
B. Wu, J. Chen, J. Wu, and M. Cardei A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks Y. Xiao, X.S. Shen, D.-Z. Du, editors. Wireless Network Security 2007 Springer Science 110 132
-
(2007)
Wireless Network Security
, pp. 110-132
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
106
-
-
84890021332
-
-
Xu, H., Liu, Y., Qi, S., Shi, Y. A novel trust model based on probability and statistics for Peer to Peer networks, pp. 2047-2050.
-
A Novel Trust Model Based on Probability and Statistics for Peer to Peer Networks
, pp. 2047-2050
-
-
Xu, H.1
Liu, Y.2
Qi, S.3
Shi, Y.4
-
107
-
-
84994391453
-
Markov chain based trust management scheme for wireless sensor networks
-
L. Xiaolong, and F. Donglei Markov chain based trust management scheme for wireless sensor networks J. Netw. 9 2014 3263
-
(2014)
J. Netw.
, vol.9
, pp. 3263
-
-
Xiaolong, L.1
Donglei, F.2
-
108
-
-
84894470959
-
Research on the Internet of Things (IoT)
-
G. Xu, Y. Ding, J. Zhao, L. Hu, and X. Fu Research on the Internet of Things (IoT) Sens. Transducers 160 2013 463
-
(2013)
Sens. Transducers
, vol.160
, pp. 463
-
-
Xu, G.1
Ding, Y.2
Zhao, J.3
Hu, L.4
Fu, X.5
-
109
-
-
84873995938
-
Random walks and green's function on digraphs: A framework for estimating wireless transmission costs
-
L. Yanhua, and Z. Zhi-Li Random walks and green's function on digraphs: a framework for estimating wireless transmission costs Netw. IEEE/ACM Trans. 21 2013 135 148
-
(2013)
Netw. IEEE/ACM Trans.
, vol.21
, pp. 135-148
-
-
Yanhua, L.1
Zhi-Li, Z.2
-
110
-
-
84893420010
-
-
Yashiro, T., Kobayashi, S., Koshizuka, N., Sakamura, K. An Internet of Things (IoT) architecture for embedded appliances, pp. 314-319.
-
An Internet of Things (IoT) Architecture for Embedded Appliances
, pp. 314-319
-
-
Yashiro, T.1
Kobayashi, S.2
Koshizuka, N.3
Sakamura, K.4
-
111
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for Ad Hoc networks
-
H. Yih-Chun, P. Adrian, and B.J. David Ariadne: a secure on-demand routing protocol for Ad Hoc networks Wirel. Netw. 11 2005 21
-
(2005)
Wirel. Netw.
, vol.11
, pp. 21
-
-
Yih-Chun, H.1
Adrian, P.2
David, B.J.3
-
112
-
-
84941662653
-
Recent advances of ICT convergence on wsn applications
-
M. Yoo, F. Wu, and C. Qiao Recent advances of ICT convergence on wsn applications Int. J. Distrib. Sens. Netw. 2015 2015 3
-
(2015)
Int. J. Distrib. Sens. Netw.
, vol.2015
, pp. 3
-
-
Yoo, M.1
Wu, F.2
Qiao, C.3
-
114
-
-
84924571073
-
Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks
-
L. Yuanjie, X. Hongyun, C. Qiying, L. Zichuan, and S. Shigen Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks Int. J. Distrib. Sens. Netw. 2015 2015
-
(2015)
Int. J. Distrib. Sens. Netw.
, vol.2015
-
-
Yuanjie, L.1
Hongyun, X.2
Qiying, C.3
Zichuan, L.4
Shigen, S.5
-
115
-
-
84908454906
-
Sybil attacks and their defenses in the internet of things
-
K. Zhang, X. Liang, R. Lu, and X. Shen Sybil attacks and their defenses in the internet of things Internet Things J. IEEE 1 2014 372 383
-
(2014)
Internet Things J. IEEE
, vol.1
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
|