Wireless Sensor Networks are becoming popular as a means of collecting data by military organisations, public utilities, motor vehicle manufacturers and security firms. Unfortunately, the devices on such networks are often insecure by default, which creates problems in terms of the confidentiality and integrity of data transmitted across such networks. This paper discusses attacks that were successful on a simple network consisting of nodes using the ZigBee protocol stack and proposes defences to thwart these attacks, thus leading to increased user confidence in the ability of organisations to provide secure and effective services. The outcomes were that it was possible to add false nodes to a test network and have these nodes accepted by t...
Securing IoT (Internet of Things) systems in general, regardless of the communication technology use...
Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area a...
International audienceWe expose concretely the information leakage occurring in an IEEE 802.15.4-bas...
Wireless Sensor Networks are becoming popular as a simple means of collecting data by public utiliti...
AbstractThe latest version of ZigBee offers improvements over many aspects like low power consumptio...
Sensor networks have many applications in monitoring and controlling of environmental properties suc...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
Conference ProceedingsIn this paper we explore the possibilities of having an algorithm that can pr...
In this paper, we investigate security issues and challenges facing researchers in wireless sensor n...
The article presents a method of wireless sensor network attacks modelling. The main ways of attack ...
With the global use of wireless sensor network technology in different fields and for different purp...
M2M is an approach where devices such as sensors and actuators connected with each other or with a c...
With ZigBee being the world’s leading IoT protocol, users are vulnerable to attacks on the wireless ...
Sensor networks offer a powerful combination of distributed sensing, computing and communications. T...
Sensor networks have many applications in monitoring and controlling of environmental properties suc...
Securing IoT (Internet of Things) systems in general, regardless of the communication technology use...
Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area a...
International audienceWe expose concretely the information leakage occurring in an IEEE 802.15.4-bas...
Wireless Sensor Networks are becoming popular as a simple means of collecting data by public utiliti...
AbstractThe latest version of ZigBee offers improvements over many aspects like low power consumptio...
Sensor networks have many applications in monitoring and controlling of environmental properties suc...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
Conference ProceedingsIn this paper we explore the possibilities of having an algorithm that can pr...
In this paper, we investigate security issues and challenges facing researchers in wireless sensor n...
The article presents a method of wireless sensor network attacks modelling. The main ways of attack ...
With the global use of wireless sensor network technology in different fields and for different purp...
M2M is an approach where devices such as sensors and actuators connected with each other or with a c...
With ZigBee being the world’s leading IoT protocol, users are vulnerable to attacks on the wireless ...
Sensor networks offer a powerful combination of distributed sensing, computing and communications. T...
Sensor networks have many applications in monitoring and controlling of environmental properties suc...
Securing IoT (Internet of Things) systems in general, regardless of the communication technology use...
Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area a...
International audienceWe expose concretely the information leakage occurring in an IEEE 802.15.4-bas...