A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
To this end, and on top of the current literature, this work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN ... Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. ... For instance, an attacker can send a Remote AT Command to a connected sensor and force it to join a malicious network in order to capture the traffic between the sensor and the network. ...doi:10.3390/sym12040579 fatcat:3ajcbbciondlrjnv73fwzph5pu
network coverage, and data transfer speed. ... Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough ... Numerous survey papers  ,  ,  refer to the IoT devices' communication medium as a wireless network and discuss the attack vector and various countermeasures. ...doi:10.1109/ojcoms.2022.3149732 fatcat:6cwlchy7avhx7ojjslyoyvsifm
However, collaboration needs to be administrated efficiently, and a CIDS raises new exploitation opportunities for adversaries. ... Accordingly, we incorporate an anonymity scheme to confront adversarial opportunities and provide a group formation algorithm to select the best fitting groups of collaborators according to a collaboration ... Camtepe applied these techniques for key distribution schemes in wireless sensor networks  . ...doi:10.14279/depositonce-3764 fatcat:ncscbf5m7vbe5liu4cc5tk63jm