Attacks on Resource-Constrained IoT Devices and Security Solutions.
Ravi SharmaNonita SharmaPublished in: Int. J. Softw. Sci. Comput. Intell. (2022)
Keyphrases
- resource constrained
- security mechanisms
- security problems
- key management
- security threats
- resource constraints
- security protocols
- embedded systems
- resource limitations
- wireless sensor networks
- buffer overflow
- sensor networks
- rfid tags
- security issues
- multipath
- mobile devices
- genetic algorithm
- benchmark problems
- cloud computing
- cyber attacks
- sensor nodes
- context aware
- real time
- leader follower