• Publications
  • Influence
On the features and challenges of security and privacy in distributed internet of things
TLDR
In the Internet of Things, services can be provisioned using centralized architectures where central entities acquire, process, and provide information. Expand
  • 880
  • 41
  • PDF
Securing the Internet of Things
This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnectionExpand
  • 632
  • 31
  • PDF
Key management systems for sensor networks in the context of the Internet of Things
TLDR
We analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicabilities of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for Sensor nodes belonging to the same WSN. Expand
  • 263
  • 15
  • PDF
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services
TLDR
We survey IoT-enabled cyber attacks, found in all application domains since 2010. Expand
  • 107
  • 13
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
TLDR
In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size. Expand
  • 124
  • 10
  • PDF
Trust management systems for wireless sensor networks: Best practices
TLDR
We list the best practices that we consider are essential for developing a good trust management system for WSN and make an analysis of the state of the art related to these practices. Expand
  • 204
  • 9
  • PDF
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
TLDR
We identify a set of threats and potential attacks in their routing protocols, and we consequently provide recommendations and countermeasures to help Industry protect its infrastructures. Expand
  • 120
  • 9
  • PDF
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
TLDR
We demonstrate how a privacy-preserving IDaaS system can be implemented using OpenID Attribute Exchange and a proxy re-encryption scheme. Expand
  • 37
  • 8
  • PDF
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
TLDR
Wireless sensor networks (WSN) behave as a digital skin, providing a virtual layer where the information about the physical world can be accessed by any computational system. Expand
  • 163
  • 6
  • PDF
Integrating wireless sensor networks and the internet: a security analysis
TLDR
We analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Expand
  • 124
  • 6
  • PDF
...
1
2
3
4
5
...