Wireless sensor networks (WSNs) are communication infrastructures containing a large number of spatially distributed nodes equipped with micro-sensors. These small devices are used to sense data from a specific region and to collaborate in order to collect and process them. Data are then transmitted to a base station. Although WSNs have existed for several decades, they are one of the key components of Internet of Things (IoT)-based products and services [1]. Indeed, they play a significant role in various future IoT application scenarios such as health care [2], environmental monitoring [3] and smart cities [4]. Comparing sensor networks to ad-hoc networks, the number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad-hoc network. Sensor nodes are densely deployed and they are limited in power, computational capacities
Vehicular Ad hoc NETworks (VANETs) are a key part of the Intelligent Transport Systems (ITS) as they constitute an intelligent transport network where vehicles and some infrastructure collaborate to exchange messages about traffic, accidents, etc. In such context, security becomes a key component to ensure that exchanged messages were not modified or inserted for example. Consequently, a wide variety of research contributions have been recently presented to cope with this issue. This paper presents a review of most recent papers dealing with security issues in VANETs. Hence, it presents an overview of VANETs and mainly their characteristics as well as their main applications. Then, the main security challenges faced by VANETs are introduced. This is done by first listing their main security requirements, second by establishing attackers' profiles, and their attacks and third by introducing some security solutions. Finally, the opportunities and challenges related to VANETs security are presented such as Trust, Internet of Vehicle, etc.
Security Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. This collaboration must be governed by security mechanisms according to the established permissions and privileges. Delegation is a common practice that is used to simplify the sharing of responsibilities and privileges. The delegation process in a SP environment can be implanted through the use of adequate formalisms and modeling. The main contribution of this paper is then, the proposition of a generic and formal modeling of delegation process. This modeling is based on three steps composing the delegation life cycle: negotiation used for delegation initiation, verification of the SP respect while delegating and revocation of an established delegation. Hence, we propose to deal with each step according to the main delegation characteristics and extend them by some new specificities
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.