[PDF][PDF] Security in IP-based Internet of Things

W Dai, VK Kalubandi - 2018 - academia.edu
… Finally, we propose two additions to the DTLS standards that helps with realizing secure
end-to-end communication for constrained devices. To summarize briely, our proposal …

Internet of things security-multilayered method for end to end data communications over cellular networks

C Lee, A Fumagalli - … 5th World Forum on Internet of Things  …, 2019 - ieeexplore.ieee.org
security element as part of the overall data transport security … establishing end-to-end
TCP/IP based Internet of Things … a secure end to end communications channel for Internet of …

[PDF][PDF] Efficient end-to-end secure key management protocol for internet of things

Y Benslimane, K BenAhmed - International Journal of Electrical …, 2017 - researchgate.net
… In this section, we presente our lightweight end-to-end key management protocol. Firstly, we
give … Secure communication in IP-based wirless sensor networks via a trusted gateway [27] …

End-to-end security scheme for mobility enabled healthcare Internet of Things

SR Moosavi, TN Gia, E Nigussie, AM Rahmani… - Future Generation …, 2016 - Elsevier
… To provide end-to-end security, the session resumption … In this article, an end-to-end security
scheme for mobility … First, we propose an end-to-end security scheme for healthcare IoT with …

Transport in the IP-based Internet of Things: status report

JA Garcia-Macias - Procedia Computer Science, 2023 - Elsevier
… experimental testbed were end-to-end transport mode, the influence of the file size, loss ratio,
and RTT; their results showed that PA-UDP has the best transport performance. Mazirap et …

Survey of intrusion detection systems towards an end to end secure internet of things

AA Gendreau, M Moorman - … on future internet of things and …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the largest technological evolutions of computing, by
2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The …

End-to-end transparent transport-layer security for internet-integrated mobile sensing devices

J Granjal, E Monteiro - 2016 IFIP Networking Conference (IFIP …, 2016 - ieeexplore.ieee.org
End-to-end transport security in the IP-Based Internet of Things. 21st International
Conference on Computer Communications and Networks, 1-5 2012 doi: 10.1109/ICCCN.…

Asymmetric end-to-end security for human-to-thing communications in the internet of things

S Sahraoui, A Bilami - Modelling and Implementation of Complex Systems …, 2016 - Springer
… of ensuring end-to-end alleviated security for human-to-thing communications. This is
achieved through an asymmetric ADSL-inspired security scheme that concentrates security only …

[PDF][PDF] A Survey of Protocols and End-To-End Security Models for Internet of Things

P Thapar, U Batra - academia.edu
… the security consideration in each protocol layer. Through this paper we present the analysis
of the end-to-end security … analyzing the end-to-end security models for Internet of Things. …

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things

S Raza, T Helgason, P Papadimitratos… - Future Generation …, 2017 - Elsevier
end-to-end secure communication between resource-constrained smart things and cloud
back-ends which supports all three security … SecureSense– our End-to-End (E2E) secure