top button
    Got Questions

Global IoT Summit 2018
Oct 31, 2018
The Leela Palace, Bangalore

    Connect to us
      Facebook Login
      Site Registration Why to Join

Facebook Login
Site Registration

What are the best papers in IoT Security?

+1 vote
posted Feb 4 by Bindhu M

Share this question
Facebook Share Button Twitter Share Button Google+ Share Button LinkedIn Share Button Multiple Social Share Button

1 Answer

0 votes

IoT security is a very important and broad area. The various aspects are presented in numerous articles. Here is a list of articles in which the IoT Secutity problem is presented relatively generally:
A.D. Wood and J. A. Stankovic: Denial of Service in Sensor Networks, Computer, Vol. 35, No. 10, Oct. 2002; DOI: 10.1109/MC.2002.1039518
J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston: Security for Sensor Networks, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, Symposium, 2002
C. Karlof and D. Wagner: “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003; DOI: 10.1109/SNPA.2003.1203362
Y. Zhou, Y. Fang and Y. Zhang: „Securing Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.10(3), 2008; DOI: 10.1109/COMST.2008.4625802
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and Klaus Wehrle: Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, Vol. 61(3), Dec. 2011; DOI: 10.1007/s11277-011-0385-5
G. Sharma, S. Bala, and A. K. Verma: Security Frameworks for Wireless Sensor Networks - Review, Procedia Technology, Vol. 6, 2012;
M. Chowdhury, M. F. Kader and Asaduzzaman: “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, Vol.6(5), Oct. 2013; DOI: 10.14257/ijfgcn.2013.6.5.10
P. B. Hari and S. N. Singh: Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, & Automation (ICACCA), Apr. 2016; DOI: 10.1109/ICACCA.2016.7578876
V. E. Ekong and U. O. Ekong: A Survey of Security Vulnerabilities in Wireless Sensor Networks, Nigerian Journal of Technology (NIJOTECH), Vol. 35(2), Apr. 2016
M. A. Ferrag, L. A. Maglaras, H. Janicke and J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec. 2016
B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr. 2017;
Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-June 2017

answer Feb 5 by Akarsh S