Jorge Granjal

Orcid: 0000-0001-6714-1164

According to our database1, Jorge Granjal authored at least 36 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments.
J. Netw. Syst. Manag., March, 2024

2023
L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things.
IEEE Access, 2023

Towards the support of Industrial IoT applications with TSCH.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

A distributed network-aware TSCH scheduling.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

2022
Energy-Aware Security Adaptation for Low-Power IoT Applications.
Network, 2022

A Survey on Security Approaches on PPDR Systems Toward 5G and Beyond.
IEEE Access, 2022

TSCH Network Health: Identifying the Breaking Point.
Proceedings of the Workshops at 18th International Conference on Intelligent Environments (IE2022), 2022

Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Security and Privacy for Mobile IoT Applications Using Blockchain.
Sensors, 2021

A Security Gateway for power distribution systems in open networks.
Comput. Secur., 2021

2020
Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions.
IEEE Access, 2020

Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms.
IEEE Access, 2020

Blockchain-based scalable authentication for IoT: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

2019
A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things.
IEEE Access, 2019

Driving Profile using Evolutionary Computation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection.
Sensors, 2018

An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN.
Secur. Commun. Networks, 2018

Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications.
Proceedings of the 3rd International Conference on Internet of Things, 2018

2017
Adaptable End-To-End Security For Mobile IoT Sensing Applications.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

2016
End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices.
Proceedings of the 2016 IFIP Networking Conference, 2016

On-chip system call tracing: A feasibility study and open prototype.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks.
EURASIP J. Inf. Secur., 2015

Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2015

Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey.
Ad Hoc Networks, 2015

2014
Communication and Security in Machine-to-Machine Systems.
Proceedings of the Wireless Networking for Moving Objects, 2014

Network-layer security for the Internet of Things using TinyOS and BLIP.
Int. J. Commun. Syst., 2014

Message from the chairs.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

2013
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013

End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Security Issues and Approaches on Wireless M2M Systems.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013

2012
On the feasibility of secure application-layer communications on the Web of Things.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
A Taxonomy of Wireless Sensor Networks with QoS.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
A secure interconnection model for IPv6 enabled wireless sensor networks.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

Enabling Network-Layer Security on IPv6 Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2008
Why is IPSec a viable option for wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008


  Loading...