Survey : self-empowered wireless sensor networks security taxonomy, challenges, and future research directions
- Adil, Muhammad, Menon, Varun, Balasubramanian, Venki, Alotaibi, Sattam, Song, Houbing, Jin, Zhanpeng, Farouk, Ahmed
- Authors: Adil, Muhammad , Menon, Varun , Balasubramanian, Venki , Alotaibi, Sattam , Song, Houbing , Jin, Zhanpeng , Farouk, Ahmed
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 23, no. 18 (2023), p. 20519-20535
- Full Text:
- Reviewed:
- Description: In the recent past, patient-wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to information anywhere and every time to improve the life standard of multifarious disease-affected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user's or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up on the underlined limitations to discuss the open security challenges of SWSNs that need the concerned authorities' attention. Based on this, we will pave a road map for future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make a comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students why this article is in time and needed in the presence of rival papers. © 2022 IEEE.
- Authors: Adil, Muhammad , Menon, Varun , Balasubramanian, Venki , Alotaibi, Sattam , Song, Houbing , Jin, Zhanpeng , Farouk, Ahmed
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 23, no. 18 (2023), p. 20519-20535
- Full Text:
- Reviewed:
- Description: In the recent past, patient-wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to information anywhere and every time to improve the life standard of multifarious disease-affected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user's or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up on the underlined limitations to discuss the open security challenges of SWSNs that need the concerned authorities' attention. Based on this, we will pave a road map for future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make a comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students why this article is in time and needed in the presence of rival papers. © 2022 IEEE.
Attacks on self-driving cars and their countermeasures : a survey
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Jolfaei, Alireza, Das, Rajkumar
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder , Jolfaei, Alireza , Das, Rajkumar
- Date: 2020
- Type: Text , Journal article , Review
- Relation: IEEE Access Vol. 8, no. (2020), p. 207308-207342
- Full Text:
- Reviewed:
- Description: Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-To-Vehicle (V2V), Vehicle-To-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle's operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-Attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-Attack. We also provide further research directions to improve the security issues associated with self-driving cars. © 2013 IEEE.
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder , Jolfaei, Alireza , Das, Rajkumar
- Date: 2020
- Type: Text , Journal article , Review
- Relation: IEEE Access Vol. 8, no. (2020), p. 207308-207342
- Full Text:
- Reviewed:
- Description: Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-To-Vehicle (V2V), Vehicle-To-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle's operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-Attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-Attack. We also provide further research directions to improve the security issues associated with self-driving cars. © 2013 IEEE.
- «
- ‹
- 1
- ›
- »