All Stories

  1. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments
  2. Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions
  3. Quoting inherent issues from TSCH behaviour.
  4. L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things
  5. Energy-Aware Security Adaptation for Low-Power IoT Applications
  6. A survey on security approaches on PPDR systems towards 5G and beyond
  7. IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things
  8. A Security Gateway for power distribution systems in open networks
  9. Security and Privacy for Mobile IoT Applications Using Blockchain
  10. Blockchain-based scalable authentication for IoT
  11. Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms
  12. Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions
  13. Internet of Things (IoT)
  14. Driving Profile using Evolutionary Computation
  15. A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
  16. Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection
  17. An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN
  18. Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications
  19. Adaptable End-To-End Security For Mobile IoT Sensing Applications
  20. On-chip system call tracing: A feasibility study and open prototype
  21. End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices
  22. A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
  23. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
  24. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
  25. Communication and Security in Machine-to-Machine Systems
  26. Message from CFIC coimbra 2013 chairs
  27. Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
  28. On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications
  29. Network-layer security for the Internet of Things using TinyOS and BLIP
  30. On the feasibility of secure application-layer communications on the Web of Things
  31. A Taxonomy of Wireless Sensor Networks with QoS
  32. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks
  33. A secure interconnection model for IPv6 enabled wireless sensor networks
  34. Why is IPSec a viable option for wireless sensor networks