[HTML][HTML] E-hip: An energy-efficient openhip-based security in internet of things networks
… Slimfit-A HIP DEX compression layer for the IP-based Internet of Things. In Proceedings of
the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking …
the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking …
P-hip: A lightweight and privacy-aware host identity protocol for internet of things
… a security analysis of P-HIP which shows that P-HIP is secure … 4) We implement a proof of
concept of P-HIP and provide a … : A HIP DEX compression layer for the IP-based Internet of …
concept of P-HIP and provide a … : A HIP DEX compression layer for the IP-based Internet of …
An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT
G Natesan, J Liu, Y Zuo - Information Technology-New …, 2017 - books.google.com
… 3] to the users and for that we need a secure architecture in which all device interactions are
… to HIP, the authors illustrated how HIP-DEX can achieve the security goal by tailoring HIP …
… to HIP, the authors illustrated how HIP-DEX can achieve the security goal by tailoring HIP …
Location Privacy for HIP Based Internet of Things
K Choi, M Kim - Advances in Computer Science and Ubiquitous …, 2018 - Springer
… [11] proposed a method to apply security architecture in IP based IoT environment through
HIP and Multimedia Internet Keying (MIKEY) protocol effectively and efficiently. It provides …
HIP and Multimedia Internet Keying (MIKEY) protocol effectively and efficiently. It provides …
An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT Applications
G Natesan, J Liu, Y Zuo - Information Technology-New Generations: 14th …, 2018 - Springer
… users and for that we need a secure architecture in which all device interactions are protected…
employed in many security solutions, the solutions associated with HIP perform better than …
employed in many security solutions, the solutions associated with HIP perform better than …
[HTML][HTML] … and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based internet of things
B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
… IP-based protocols includes Datagram Transport Layer Security (DTLS) [4], HIP DEX [5], a
minimal Internet … ; Morchon, OG HIP security architecture for the IP-based internet of things. In …
minimal Internet … ; Morchon, OG HIP security architecture for the IP-based internet of things. In …
Survey on security in Internet of Things: State of the art and challenges
… Fig.2 illustrate security framework for 6lowPAN; which aim at bootstrapping … the ip-based
internet of things with hip and dtls. In Proceedings of the sixth ACM conference on Security and …
internet of things with hip and dtls. In Proceedings of the sixth ACM conference on Security and …
Security mechanisms for 6LoWPAN network in context of internet of things: A Survey
Y Benslimane, K Benahmed, H Benslimane - Renewable Energy for Smart …, 2019 - Springer
… The integration of IP based WSN with the Internet will require … on security protocols like DTLS,
HIP and IKE for the outward … -to-end security architecture for the Internet of Things with two-…
HIP and IKE for the outward … -to-end security architecture for the Internet of Things with two-…
CHIP: Collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
… original HIP Base exchange (HIP BEX), the lighter version HIP … as a major pilar of IoT security
architecture [12]. The … End-to-end transport security in the ip-based Internet of Things. In …
architecture [12]. The … End-to-end transport security in the ip-based Internet of Things. In …
HIPs: Hierarchical intrusion prevention system for conquering denial of sleep attacks in Internet of Things
AJ Husain, MA Mohamed - Asian Journal of Research in Social …, 2017 - indianjournals.com
… attack for IP based WSNs. In SVELTE Raza, et al. [13] proposed a hybrid IDS system for IoT.
… In this paper, they designed the IDS architecture on the basis of Event Processing Model (…
… In this paper, they designed the IDS architecture on the basis of Event Processing Model (…