Skip to main content

Security Vulnerabilities and Issues of Traditional Wireless Sensors Networks in IoT

  • Chapter
  • First Online:
Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 174))

Abstract

From the past decade, Wireless sensor networks (WSNs) spread out significantly with the result of technological progress in hardware, software, and micro electro mechanical systems. With the enlargement of WSNs, great advances have been shaped in Internet-of-Things (IoT) by an ample variety of applications. IoT applications practiced in myriad phases include human life, ecological supervise, public wellbeing and medical behavior, smart shipping, traffic monitoring, smart cities, smart home applications, smart grid, and others. Mostly Internet of Things maintained with various sensing devices and technologies such as Sensors, GPS (Global positioning system), laser sensor, gas inductor, RFID (Radio-frequency identification devices), infrared sensor and many more, which collects large range features from the real world and send abstract feature objects which need to be monitored. Most of the devices are linked and interacted with more than one. The main idea behind IoT is to connect device-to-device, device-to-human, human-to-human. Development of IoT can make people live in a convenient way; however, it does not make sure the security of secret confidential information of its user. With a great collection of distribution, responsiveness and somewhat high processing capacity of IoT objects formed them as an optimal objective for cyber-attacks. So here some probabilities, secret confidential information may be a leak or stolen some point in time. Just once a sign of IoT device is captured or suspended it intention straightforwardly perturbs the security about whole information of IoT. Moreover, enormous IoT nodes accumulate a large amount of extensive prosperous, private information and process it, so its like lottery for cyber attackers to steal entire important data. Security obstacles like privacy, secure communication, access control, safe storage of data are becoming important tackles in the IoT domain. Hence, each solitary node that we positioned, each solitary device that we discover, each solitary byte that generated within the sphere of an IoT domain, at some point of time comes under inspection in the course of the investigation. An IoT not including proper premeditated solutions for security issues it will principally limit its improvement. So securities, in particular, the ability to detect malicious nodes with preserving support of malicious activities appear as a priority in the successful employment of IoT networks. IoT has three dissimilar layers, each layers security approaches along with defensive methods are briefly described. Blockchain technology will progress the integrity in the real world shared data sets. Primarily blockchain applied in support of recording fiscal transactions where connections encoded (pre-arranged) and kept back with participants, on one occasion transaction confirmed by blockchain it cannot be modeled or else wipe out; if any modification is applied it is easy to map out and recognize. Blockchain technology position in IoT security, challenges, and Research problems in brief discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gen. Comput. Syst. 82, 395–411 (2015)

    Article  Google Scholar 

  2. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Netw. 20, 2481–2501 (2014)

    Google Scholar 

  3. Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: a top-down survey. Comput. Netw. 1–24 (2018)

    Google Scholar 

  4. Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in Internet of Things. Digit. Commun. Netw. (2017). https://doi.org/10.1016/j.dcan.2017.04.003

    Article  Google Scholar 

  5. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146 (2015)

    Google Scholar 

  6. Zhao, K., Ge, L.: A survey on the Internet of Things security. In: 2013 Ninth International Conference on Computational Intelligence and Security (2013)

    Google Scholar 

  7. Bhanu chander, Kumaravelan: Simple and secure authentication in wireless sensor network using digital certification. Int. J. Pure Appl. Math. 119(16), 137–143 (2018)

    Google Scholar 

  8. Bhanu chander, Kumaravelan: Introduction to WSN. Soft Computing in WSN. CRC Press/Taylor and Francis Publications (2018)

    Google Scholar 

  9. Sen, J.: Security in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1 & 2) (2014)

    Google Scholar 

  10. Alam, S., De, D.: Analysis of security threats in wireless sensor network. Int. J. Wireless Mob. Netw. (IJWMN) 6(2) (2014)

    Google Scholar 

  11. Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4(1 & 2) (2009)

    Google Scholar 

  12. Akyildiz, I.F., Su, W., Sanakarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  13. Hamad, F., Smalov, L., James, A.: Energy-aware security in M-Commerce and the internet of things. IETE Tech. Rev. 26(5), 357–362 (2009)

    Google Scholar 

  14. Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Proceedings of Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 196–200 (2006)

    Google Scholar 

  15. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of Mobile Communications, pp. 128–139 (2008)

    Google Scholar 

  16. Montenegro, G., Castelluccia, C.: Crypto-based identifiers (CBIDs): concepts and applications. ACM Trans. Inf. Syst. Secur. 7(1), 97–127 (2004)

    Article  Google Scholar 

  17. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. Secur. Pervas. Comput. 201–212 (2004)

    Google Scholar 

  18. Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 103–111 (2003)

    Google Scholar 

  19. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, p. 82. MIT, Cambridge, MA (2003)

    Google Scholar 

  20. Lakafosis, V., Traille, A., Lee, H.: RFID-CoA: the RFID tags as certificates of authenticity. In: Proceedings of the IEEE International Conference on RFID, pp. 207–214 (2011)

    Google Scholar 

  21. Hu, F., Wang, F.: Study of recent development about privacy and security of the internet of things. In: Proceedings of the International Conference on Web Information Systems and Mining, pp. 91–95 (2010)

    Google Scholar 

  22. Lv, B.Y., Pan, J.X., Ma, Q., Xiao, Z.H.: Research progress and application of RFID anti-collision algorithm. In: Proceedings of the International Conference on Telecommunication Engineering, vol. 48, no. 7, pp. 124–128 (2008)

    Google Scholar 

  23. Finkenzeller, K.: RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd edn. Wiley, West Sussex (2003)

    Google Scholar 

  24. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, pp. 162–175 (2004)

    Google Scholar 

  25. Chen, M., Lai, C., Wang, H.: Mobile multimedia sensor networks: architecture and routing. EURASIP J. Wireless Commun. Netw. 1–9 (2011)

    Google Scholar 

  26. Han, K., Luo, J., Liu, Y., Vasilakos, V.: Algorithm design for data communications in duty-cycled wireless sensor networks: a survey. IEEE Commun. Mag. 51(7), 107–113 (2013)

    Article  Google Scholar 

  27. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks SECON04, pp. 71–80 (2004)

    Google Scholar 

  28. Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Netw. 1(1), 175–192 (2003)

    Article  Google Scholar 

  29. Huang, C.H., Du, D.Z.: New constructions on broadcast encryption and key pre-distribution schemes. In: IEEE INFOCOM, pp. 515–523 (2005)

    Google Scholar 

  30. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  31. Ren, F.Y., Huang, H.N., Lin, C.: Wireless sensor networks. J. Softw. 1282–1290 (2003)

    Google Scholar 

  32. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)

    Article  Google Scholar 

  33. Cao, Z., Hu, J.B., Chen, Z., Xu, M.X., Zhou, X.: Feedback: towards dynamic behavior and secure routing in wireless sensor networks. In: Proceedings of the IEEE Workshop on Pervasive Computing and Ad-hoc Communication (PCAC’06), vol. 2, pp. 160–164 (2006)

    Google Scholar 

  34. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)

    Article  Google Scholar 

  35. Douceur, J.R.: The Sybil attack. In: Proceeding of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), pp. 251–260 (2002)

    Google Scholar 

  36. KSW Microtec AG: KSW—TempSens (2013). http://www.ksw-microtec.de/www/doc/overviewtempsens1124436343en.pdf. Accessed 12 Oct

  37. Wang, K., Bao, J., Wu, M., Lu, W.: Research on security management for internet of things. In: Proceeding of the IEEE International Conference on Computer Application and System Modeling (ICCASM), vol. 15, pp. 133–137 (2010)

    Google Scholar 

  38. Zhang, L., Wang, Z.: Integration of RFID into wireless sensor networks: architectures, opportunities and challenging problems. In: Proceeding of the IEEE Fifth International Conference on Grid and Cooperative Computing Workshops GCCW ‘06 (58), pp. 463–469 (2006)

    Google Scholar 

  39. Li, C., Chen, C.L.: A multi-stage control method application in the fight against phishing attacks. In: Proceeding of the 26th Computer Security Academic Communication Across the Country, pp. 145–153 (2011)

    Google Scholar 

  40. Liu, Z.Y., Yang, Z.C.: Ad hoc network and security analysis. Comput. Technol. Dev. 16(1) (2006)

    Google Scholar 

  41. Avudainayagam, A., Lou, W., Fang, Y.: DEAR: a device and energy aware routing protocol for heterogeneous ad hoc networks. Parallel Distrib. Comput. 63(2), 228–236 (2003)

    Article  Google Scholar 

  42. Yang, Z.W.: Look the internet of things from the internet and 3G. Radio frequency (rf) in the world, (01) (2010)

    Google Scholar 

  43. Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on fuzzy-AHP method. In: Proceeding of the IEEE International Conference on E-Business and E-Government (ICEE), pp. 1–5 (2011)

    Google Scholar 

  44. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 557–570 (2002)

    Google Scholar 

  45. de Saint-Exupery, A.: Internet of things [EB/OL]. http://www.sintef.no/upload/IKT/9022/CERP-IoT%20SRA_IoT_vll_pdf.pf. Accessed 12 Oct 2013

  46. Zhang, D., Zhou, J., Guo, M., Cao, J., Li, T.: TASA: tag-free activity sensing using RFID tag arrays. IEEE Trans. Parallel Distrib. Syst. 22(4), 558–570 (2011)

    Article  Google Scholar 

  47. Zai, L., Liu, S.D., Hu, X.B.: ZigBee Technology and Application. Beijing University of Aeronautics and Astronautics Press, Beijing (2007)

    Google Scholar 

  48. Shao, P.F., Wang, Z., Zhang, B.R.: Smart home system research for the mobile internet. Comput. Meas. Control 20(2), 474–476 (2012)

    Google Scholar 

  49. Da Costa Júnior, E.P.: An Architecture for Self-adaptive Distributed Firewall

    Google Scholar 

  50. Li, B., Lu, R., Wang, W., Choo, K.-K.R.: Distributed host-based collaborative detection for false data injection attacks in smart grid cyberphysical system. J. Parallel Distrib. Comput. 103, 32–41 (2017)

    Article  Google Scholar 

  51. Almotiri, S.H., Khan, M.A., Alghamdi, M.A.: Mobile health (m-Health) system in the context of IoT. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, pp. 39–42 (2016)

    Google Scholar 

  52. Papastergiou, S., Polemi, N., Karantjias, A.: CYSM: an innovative physical/cyber security management system for ports. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 219–230 (2015)

    Google Scholar 

  53. Wang, X., Zha, X., Ni, W.: Survey on block chain for Internet of Things. Comput. Commun. (2019). https://doi.org/10.1016/j.comcom.2019.01.006

    Article  Google Scholar 

  54. Ejaz, W., Anpalagan, A.: Internet of Things for Smart Cities. Springer Briefs in Electrical and Computer Engineering (2017). https://doi.org/10.1007/978-3-319-95037-2_5

  55. Efanov, D., Roschin, P.: The all-pervasiveness of Blockchain Technology. In: 8th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2017. Procedia Computer Science, pp. 116–121 (2018)

    Google Scholar 

  56. Gordon, W.J., Catalini, C.: Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)

    Article  Google Scholar 

  57. Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for internet of things security: a position paper. Digit. Commun. Netw. 149–160 (2018)

    Google Scholar 

  58. Rennock, M.J.W., Cohn, A., Butcher, J.R.: Blockchain Technology and Regulatory Investigation, February/March 2018 | Practical Law© 2018 Thomson Reuters (2018)

    Google Scholar 

  59. Nuce, M.: Blockchain and Data Sharing. CSCMP Hot Topics, April 6 (2018)

    Google Scholar 

  60. Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future to Internet of Things security: a position paper. Digit. Commun. Netw. (2017). https://doi.org/10.1016/j.dcan.2017.10.006

    Article  Google Scholar 

  61. Zhang, P., White, J., Schmidt, D.C., Lenz, G., Trent Rosenbloom, S.: FHIRChain: applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16, 267–278 (2018)

    Article  Google Scholar 

  62. Greenspan, G.: Blockchains vs centralized databases (2018). Available at https://www.multichain.com/blog/2016/03/blockchains-vs-centralized-databases. Accessed 16 Jul 2018

  63. Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., Wang, F.: Secure and trustable electronic medical records sharing using blockchain. arXiv preprint arXiv:1709.06528 (2017)

  64. Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2(1), 24 (2016)

    Google Scholar 

  65. Zhang, Y., Wen, J.: The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 1–12 (2016)

    Google Scholar 

  66. Jin, Y., Tomoishi, M., Matsuura, S.: Enhancement of VPN authentication using GPS information with geo-privacy protection. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2016)

    Google Scholar 

  67. Keshri, A., Singh, S., Agarwal, M., Nandiy, S.K.: DoS attacks prevention using IDS and data mining. In: 2016 International Conference on Accessibility to Digital World (ICADW), Guwahati, pp. 87–92 (2016)

    Google Scholar 

  68. Filipek, J., Hudec, L.: Securing mobile ad hoc networks using distributed firewall with PKI. In: 2016 IEEE 14th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herlany, pp. 321–325 (2016)

    Google Scholar 

  69. Dewanjee, R.: Intrusion Filtration System (IFS)-mapping network security in new way. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 527–531 (2016)

    Google Scholar 

  70. Kalnoor, G., Agarkhed, J.: Pattern matching intrusion detection technique for Wireless Sensor Networks. In: 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-informatics (AEEICB), Chennai, pp. 724–728 (2016)

    Google Scholar 

  71. Yacchirena, A., Alulema, D., Aguilar, D., Morocho, D., Encalada, F., Granizo, E.: Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. In: 2016 IEEE International Conference on Automatica (ICA-ACCA), Curico, pp. 1–7 (2016)

    Google Scholar 

  72. Jokar, P., Leung, V.: Intrusion detection and prevention for ZigBee-based home area networks in smart grids. In: IEEE Transactions on Smart Grid (2017)

    Google Scholar 

  73. Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: MADAM: effective and efficient behavior-based android malware detection and prevention. In: IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 1–12 (2017)

    Google Scholar 

  74. Osop, H., Sahama, T.: Quality evidence, quality decisions: ways to improve security and privacy of EHR systems. In: 2016 IEEE 18th International Conference on eHealth Networking, Applications and Services (Healthcom), Munich, pp. 1–6 (2016)

    Google Scholar 

  75. Sharma, A., Bhuriya, D., Singh, U.: Secure data transmission on MANET by hybrid cryptography technique. In: 2015 International Conference on Computer, Communication and Control (IC4), Indore, pp. 1–6 (2015)

    Google Scholar 

  76. Indumathi, G., Sakthivel, S.: Securely detecting an intruders in MANETs system. In: International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–5 (2014)

    Google Scholar 

  77. Hiran, R., Carlsson, N., Shahmehri, N.: PrefiSec: a distributed alliance framework for collaborative BGP monitoring and prefix-based security. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS ‘14). ACM, New York, NY, USA, pp. 3–12 (2014)

    Google Scholar 

  78. Wagner, C.: MISP: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM (2016)

    Google Scholar 

  79. Bouchami, A., Goettelmann, E., Perrin, O., Godart, C.: Enhancing access-control with risk-metrics for collaboration on social cloud-platforms. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, pp. 864–871 (2015)

    Google Scholar 

  80. Bennaceur, A., Bandara, A.K., Jackson, M., Liu, W., Montrieux, L., Tun, T.T., Yu, Y., Nuseibeh, B.: Requirements-driven mediation for collaborative security. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems (SEAMS 2014), pp. 37–42. ACM, New York, NY, USA (2014)

    Google Scholar 

  81. Arya, N., Singh, U., Singh, S.: Detecting and avoiding of wormhole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm. In: 2015 International Conference on Computer, Communication and Control (IC4), Indore, pp. 1–5 (2015)

    Google Scholar 

  82. Pan, X., Yegneswaran, V., Chen, Y., Porras, P., Shin, S.: HogMap: using SDNs to incentivize collaborative security monitoring. In: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security ‘16), pp. 7–13. ACM, New York, NY, USA (2016)

    Google Scholar 

  83. Gaurav, K., Goyal, P., Agrawal, V., Rao, S.L.: IoT transaction security. In: 5th International Conference on the Internet of Things (IoT), Seoul, South Korea (2015)

    Google Scholar 

  84. Hashemi, S.H., Faghri, F., Rausch, P., Campbell, R.H.: World of empowered IoT users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 13–24. IEEE (2016). https://doi.org/10.1109/iotdi.2015.39

  85. Atzori, M.: Blockchain-based architectures for the internet of things: a survey (2017). Available at SSRN: https://ssrn.com/abstract=2846810

  86. Kokoris-Kogias, L., Gasser, L., Khoffi, I., Jovanovic, P., Gailly, N., Ford, B.: Managing identities using blockchains and CoSi. In: 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), EPFL-TALK-220210 (2016)

    Google Scholar 

  87. Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016). https://doi.org/10.1007/s10916-016-0574-6

    Article  Google Scholar 

  88. Conoscenti, M., Vetrò, A., De Martin, J.C.: Block Chain for the Internet of Things: A Systematic Literature Review, pp. 1–6 (2016)

    Google Scholar 

  89. Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392–1393. IEEE (2016). https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198

  90. Hardjono, T., Smith, N.: Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 29–36. ACM (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhanu chander .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bhanu chander, Kumaravelan Gopalakrishnan (2020). Security Vulnerabilities and Issues of Traditional Wireless Sensors Networks in IoT. In: Peng, SL., Pal, S., Huang, L. (eds) Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. Intelligent Systems Reference Library, vol 174. Springer, Cham. https://doi.org/10.1007/978-3-030-33596-0_21

Download citation

Publish with us

Policies and ethics