The limitations in the state-of-the-art counter-measures against the security threats in H-IoT
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT
Authors
Keywords
-
Journal
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-01-01
DOI
10.1007/s10586-019-03036-7
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A Decentralized Privacy-Preserving Healthcare Blockchain for IoT
- (2019) Ashutosh Dwivedi et al. SENSORS
- An intrusion detection system for connected vehicles in smart cities
- (2019) Moayad Aloqaily et al. Ad Hoc Networks
- Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution
- (2019) Yousaf Bin Zikria et al. SENSORS
- Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack
- (2019) Sarwar Sayeed et al. Applied Sciences-Basel
- Energy monitoring in IoT-based ad hoc networks: An overview
- (2019) Fadi Al-Turjman et al. COMPUTERS & ELECTRICAL ENGINEERING
- Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond
- (2019) Yueyue Dai et al. IEEE NETWORK
- A Blockchain Framework for Securing Connected and Autonomous Vehicles
- (2019) Rathee et al. SENSORS
- QoS enhancement with deep learning-based interference prediction in mobile IoT
- (2019) Saniya Zafar et al. COMPUTER COMMUNICATIONS
- A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services
- (2019) Ismaeel Al Ridhawi et al. IEEE Transactions on Industrial Informatics
- Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0
- (2018) M. Faheem et al. APPLIED SOFT COMPUTING
- Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust
- (2018) Deepak C. Mehetre et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- On blockchain and its integration with IoT. Challenges and opportunities
- (2018) Ana Reyna et al. Future Generation Computer Systems-The International Journal of eScience
- A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation
- (2018) Cong Pu et al. IEEE Systems Journal
- From EDA to IoT eHealth: Promise, Challenges, and Solutions
- (2018) Farshad Firouzi et al. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
- Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0
- (2018) M. Faheem et al. Transactions on Emerging Telecommunications Technologies
- A survey on privacy protection in blockchain system
- (2018) Qi Feng et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- TrustChain: A Sybil-resistant scalable blockchain
- (2017) Pim Otte et al. Future Generation Computer Systems-The International Journal of eScience
- Anonymous Authentication for Wireless Body Area Networks With Provable Security
- (2017) Debiao He et al. IEEE Systems Journal
- Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities
- (2017) Stephanie B. Baker et al. IEEE Access
- A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
- (2017) Ivana Tomic et al. IEEE Internet of Things Journal
- Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
- (2016) Ju Ren et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Design of MAC Layer Resource Allocation Schemes for IEEE 802.11ax: Future Directions
- (2016) Rashid Ali et al. IETE TECHNICAL REVIEW
- WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
- (2016) Rupinder Singh et al. Mobile Information Systems
- An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET
- (2016) Ali Dorri WIRELESS NETWORKS
- EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks
- (2015) Muhammad Faheem et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs
- (2015) Anfeng Liu et al. SENSORS
- Securing DSR against wormhole attacks in multirate ad hoc networks
- (2013) Shams Qazi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
- (2009) Majid Khabbazian et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started