top button
    Got Questions


Global IoT Summit 2018
Oct 31, 2018
The Leela Palace, Bangalore



    Connect to us
      Facebook Login
      Site Registration Why to Join

Facebook Login
Site Registration

What are the best papers in IoT Security?

+1 vote
87 views
posted Feb 4 by Bindhu M

Share this question
Facebook Share Button Twitter Share Button Google+ Share Button LinkedIn Share Button Multiple Social Share Button

1 Answer

0 votes

IoT security is a very important and broad area. The various aspects are presented in numerous articles. Here is a list of articles in which the IoT Secutity problem is presented relatively generally:
A.D. Wood and J. A. Stankovic: Denial of Service in Sensor Networks, Computer, Vol. 35, No. 10, Oct. 2002; DOI: 10.1109/MC.2002.1039518
http://ieeexplore.ieee.org/document/1039518/
J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston: Security for Sensor Networks, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, Symposium, 2002
https://www.csee.umbc.edu/courses/pub/cadip/2002Symposium/sensor-ids.pdf
C. Karlof and D. Wagner: “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003; DOI: 10.1109/SNPA.2003.1203362
http://ieeexplore.ieee.org/document/1203362/
Y. Zhou, Y. Fang and Y. Zhang: „Securing Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.10(3), 2008; DOI: 10.1109/COMST.2008.4625802
http://ieeexplore.ieee.org/document/4625802/
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and Klaus Wehrle: Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, Vol. 61(3), Dec. 2011; DOI: 10.1007/s11277-011-0385-5
https://link.springer.com/article/10.1007/s11277-011-0385-5
G. Sharma, S. Bala, and A. K. Verma: Security Frameworks for Wireless Sensor Networks - Review, Procedia Technology, Vol. 6, 2012; https://doi.org/10.1016/j.protcy.2012.10.119
http://www.sciencedirect.com/science/article/pii/S2212017312006640
M. Chowdhury, M. F. Kader and Asaduzzaman: “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, Vol.6(5), Oct. 2013; DOI: 10.14257/ijfgcn.2013.6.5.10
https://www.researchgate.net/publication/283091407_Security_Issues_in_Wireless_Sensor_Networks_A_Survey
P. B. Hari and S. N. Singh: Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, & Automation (ICACCA), Apr. 2016; DOI: 10.1109/ICACCA.2016.7578876
http://ieeexplore.ieee.org/document/7578876/
V. E. Ekong and U. O. Ekong: A Survey of Security Vulnerabilities in Wireless Sensor Networks, Nigerian Journal of Technology (NIJOTECH), Vol. 35(2), Apr. 2016
https://www.ajol.info/index.php/njt/article/viewFile/140619/130359
M. A. Ferrag, L. A. Maglaras, H. Janicke and J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec. 2016
https://arxiv.org/abs/1612.07206
B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr. 2017; https://doi.org/10.1016/j.jnca.2017.02.009
http://www.sciencedirect.com/science/article/pii/S1084804517300802
Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-June 2017
http://www.ijarcs.info/index.php/Ijarcs/article/viewFile/3980/3520

answer Feb 5 by Akarsh S
...