It is well recognized that security will play a major role in enabling most of the applications envisioned for the Internet of Things (IoT). We must also note that most of such applications will employ sensing and actuating devices integrated with the Internet communications infrastructure and, from the minute such devices start to support end-to-end communications with external (Internet) hosts, they will be exposed to all kinds of threats and attacks. With this in mind, we propose an IDS framework for the detection and prevention of attacks in the context of Internet-integrated CoAP communication environments and, in the context of this framework, we implement and experimentally evaluate the effectiveness of anomaly-based intrusion detect...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
International audienceThe use of wireless communication is a major trend in the so called Supervisor...
Network security is vital in wireless networks that are widely used today. We desire wireless networ...
It is well recognized that security will play a major role in enabling most of the applications envi...
End-to-end communications between Internet devices and Internet-integrated constrained wireless sens...
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an e...
As pervasive interconnection of autonomous sensor devices gave birth to a broad class of exiting new...
Wireless sensor networks have become a mature technology. They are increasingly being used in differ...
Due to the inherent features and weaknesses of Wireless Sensor Networks (WSNs) and the specific thre...
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSN...
Wireless Sensor Networks (WSNs) have become a hot research topic in recent years. They have many pot...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
International audienceIn the last few years, the technological evolution in the field of wireless se...
International audienceIn the last few years, the technological evolution in the field of wireless se...
Wireless sensor network (WSN) technology is being increasingly used for data collection in critical ...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
International audienceThe use of wireless communication is a major trend in the so called Supervisor...
Network security is vital in wireless networks that are widely used today. We desire wireless networ...
It is well recognized that security will play a major role in enabling most of the applications envi...
End-to-end communications between Internet devices and Internet-integrated constrained wireless sens...
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an e...
As pervasive interconnection of autonomous sensor devices gave birth to a broad class of exiting new...
Wireless sensor networks have become a mature technology. They are increasingly being used in differ...
Due to the inherent features and weaknesses of Wireless Sensor Networks (WSNs) and the specific thre...
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSN...
Wireless Sensor Networks (WSNs) have become a hot research topic in recent years. They have many pot...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
International audienceIn the last few years, the technological evolution in the field of wireless se...
International audienceIn the last few years, the technological evolution in the field of wireless se...
Wireless sensor network (WSN) technology is being increasingly used for data collection in critical ...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
International audienceThe use of wireless communication is a major trend in the so called Supervisor...
Network security is vital in wireless networks that are widely used today. We desire wireless networ...