• Publications
  • Influence
Key management systems for sensor networks in the context of the Internet of Things
TLDR
We analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicabilities of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for Sensor nodes belonging to the same WSN. Expand
  • 265
  • 15
  • PDF
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services
TLDR
We survey IoT-enabled cyber attacks, found in all application domains since 2010. Expand
  • 109
  • 13
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
TLDR
In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size. Expand
  • 124
  • 10
  • PDF
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
TLDR
We identify a set of threats and potential attacks in their routing protocols, and we consequently provide recommendations and countermeasures to help Industry protect its infrastructures. Expand
  • 120
  • 9
  • PDF
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
TLDR
Wireless sensor networks (WSN) behave as a digital skin, providing a virtual layer where the information about the physical world can be accessed by any computational system. Expand
  • 163
  • 6
  • PDF
Critical Control System Protection in the 21st Century
TLDR
Critical control systems manage many of today's critical infrastructures, whose continuous operation, maintenance, and protection are high national priorities for governments around the world. Expand
  • 41
  • 4
Critical infrastructure protection: Requirements and challenges for the 21st century
TLDR
This paper explores the vulnerabilities and threats facing modern critical infrastructures with special emphasis on industrial control systems, and describes a number of protection measures. Expand
  • 157
  • 3
  • PDF
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
TLDR
This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Expand
  • 109
  • 3
  • PDF
OCPP Protocol: Security Threats and Challenges
TLDR
This paper studies key security properties of the already-deployed Open Charge Point Protocol specifying communication between charging points and energy management systems. Expand
  • 34
  • 3
  • PDF
Managing Incidents in Smart Grids à la Cloud
TLDR
We propose the use of Virtual SCADA in the Cloud (VS-Cloud) as a means to improve reliability and efficiency whilst maintaining the same protection level as in traditional SCADA architectures. Expand
  • 28
  • 3
  • PDF
...
1
2
3
4
5
...