[PDF][PDF] Security in IP-based Internet of Things
W Dai, VK Kalubandi - 2018 - academia.edu
… Finally, we propose two additions to the DTLS standards that helps with realizing secure
end-to-end communication for constrained devices. To summarize briely, our proposal …
end-to-end communication for constrained devices. To summarize briely, our proposal …
Internet of things security-multilayered method for end to end data communications over cellular networks
C Lee, A Fumagalli - … 5th World Forum on Internet of Things …, 2019 - ieeexplore.ieee.org
… security element as part of the overall data transport security … establishing end-to-end
TCP/IP based Internet of Things … a secure end to end communications channel for Internet of …
TCP/IP based Internet of Things … a secure end to end communications channel for Internet of …
[PDF][PDF] Efficient end-to-end secure key management protocol for internet of things
Y Benslimane, K BenAhmed - International Journal of Electrical …, 2017 - researchgate.net
… In this section, we presente our lightweight end-to-end key management protocol. Firstly, we
give … Secure communication in IP-based wirless sensor networks via a trusted gateway [27] …
give … Secure communication in IP-based wirless sensor networks via a trusted gateway [27] …
End-to-end security scheme for mobility enabled healthcare Internet of Things
… To provide end-to-end security, the session resumption … In this article, an end-to-end security
scheme for mobility … First, we propose an end-to-end security scheme for healthcare IoT with …
scheme for mobility … First, we propose an end-to-end security scheme for healthcare IoT with …
Transport in the IP-based Internet of Things: status report
JA Garcia-Macias - Procedia Computer Science, 2023 - Elsevier
… experimental testbed were end-to-end transport mode, the influence of the file size, loss ratio,
and RTT; their results showed that PA-UDP has the best transport performance. Mazirap et …
and RTT; their results showed that PA-UDP has the best transport performance. Mazirap et …
Survey of intrusion detection systems towards an end to end secure internet of things
AA Gendreau, M Moorman - … on future internet of things and …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the largest technological evolutions of computing, by
2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The …
2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The …
End-to-end transparent transport-layer security for internet-integrated mobile sensing devices
J Granjal, E Monteiro - 2016 IFIP Networking Conference (IFIP …, 2016 - ieeexplore.ieee.org
… End-to-end transport security in the IP-Based Internet of Things. 21st International
Conference on Computer Communications and Networks, 1-5 2012 doi: 10.1109/ICCCN.…
Conference on Computer Communications and Networks, 1-5 2012 doi: 10.1109/ICCCN.…
Asymmetric end-to-end security for human-to-thing communications in the internet of things
S Sahraoui, A Bilami - Modelling and Implementation of Complex Systems …, 2016 - Springer
… of ensuring end-to-end alleviated security for human-to-thing communications. This is
achieved through an asymmetric ADSL-inspired security scheme that concentrates security only …
achieved through an asymmetric ADSL-inspired security scheme that concentrates security only …
[PDF][PDF] A Survey of Protocols and End-To-End Security Models for Internet of Things
P Thapar, U Batra - academia.edu
… the security consideration in each protocol layer. Through this paper we present the analysis
of the end-to-end security … analyzing the end-to-end security models for Internet of Things. …
of the end-to-end security … analyzing the end-to-end security models for Internet of Things. …
SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
S Raza, T Helgason, P Papadimitratos… - Future Generation …, 2017 - Elsevier
… end-to-end secure communication between resource-constrained smart things and cloud
back-ends which supports all three security … SecureSense– our End-to-End (E2E) secure …
back-ends which supports all three security … SecureSense– our End-to-End (E2E) secure …