Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions

2018 ◽  
Vol 10 (11) ◽  
pp. 4377-4405
Author(s):  
Shashank Gupta ◽  
B. B. Gupta
2020 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF’s ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node’s resources and degrade the network’s performance. In this paper, we present a study on</div><div>various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</div>


2020 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF’s ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node’s resources and degrade the network’s performance. In this paper, we present a study on</div><div>various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</div>


2017 ◽  
Vol 19 (3) ◽  
pp. 1457-1477 ◽  
Author(s):  
Shikhar Verma ◽  
Yuichi Kawamoto ◽  
Zubair Md. Fadlullah ◽  
Hiroki Nishiyama ◽  
Nei Kato

2014 ◽  
Vol 15 (9) ◽  
pp. 776-793 ◽  
Author(s):  
Han Qi ◽  
Muhammad Shiraz ◽  
Jie-yao Liu ◽  
Abdullah Gani ◽  
Zulkanain Abdul Rahman ◽  
...  

Author(s):  
Ramgopal Kashyap

A large vault of terabytes of information created every day from present-day data frameworks and digital innovations, for example, the internet of things and distributed computing. Investigation of this enormous information requires a ton of endeavors at different dimensions to separate learning for central leadership. An examination is an ebb-and-flow territory of innovative work. The fundamental goal of this paper is to investigate the potential effect of enormous information challenges, open research issues, and different instruments related to it. Subsequently, this article gives a stage to study big data at various stages. It opens another skyline for analysts to build up the arrangement in light of the difficulties, and open research issues. The article comprehended that each large information stage has its core interest. Some of this is intended for bunch handling while some are great at constant scientific. Each large information stage likewise has explicit usefulness. Unique procedures were utilized for the investigation.


Author(s):  
Wenbing Zhao

In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.


2022 ◽  
pp. 1249-1274
Author(s):  
Ramgopal Kashyap

A large vault of terabytes of information created every day from present-day data frameworks and digital innovations, for example, the internet of things and distributed computing. Investigation of this enormous information requires a ton of endeavors at different dimensions to separate learning for central leadership. An examination is an ebb-and-flow territory of innovative work. The fundamental goal of this paper is to investigate the potential effect of enormous information challenges, open research issues, and different instruments related to it. Subsequently, this article gives a stage to study big data at various stages. It opens another skyline for analysts to build up the arrangement in light of the difficulties, and open research issues. The article comprehended that each large information stage has its core interest. Some of this is intended for bunch handling while some are great at constant scientific. Each large information stage likewise has explicit usefulness. Unique procedures were utilized for the investigation.


Sign in / Sign up

Export Citation Format

Share Document