Security for internet of things: A state of the art on existing protocols and open research issues
C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
… A large number of applications utilize 6LoWPAN for IP-based … a new security protocol
named ”Combined 6LoWPSec” operating alternately at the MAC and at the adaptation layers, …
named ”Combined 6LoWPSec” operating alternately at the MAC and at the adaptation layers, …
Transport in the IP-based Internet of Things: status report
JA Garcia-Macias - Procedia Computer Science, 2023 - Elsevier
… A similar approach was taken when building the 6LoWPAN (IPv6 over Low power Wireless
Personal Area Networks) adaptation layer for IPv6-based IoT networks, where optimizations …
Personal Area Networks) adaptation layer for IPv6-based IoT networks, where optimizations …
TCP/IP and ICN networking technologies for the Internet of Things: A comparative study
… IP based IoT solutions for routing and forwarding, interoperability and scalability, mobility
handling, and security… possible thanks to the 6LoWPAN adaptation layer, as an overlay on the …
handling, and security… possible thanks to the 6LoWPAN adaptation layer, as an overlay on the …
Internet of things: Protocols, applications and security issues
S Choudhary, G Meena - Procedia Computer Science, 2022 - Elsevier
… , the BLE protocol stack facilitates IP-based … the Internet of Things (IoT) systems is reducing
the computational resources required for public-key cryptography and other security protocols …
the computational resources required for public-key cryptography and other security protocols …
A flow-based intrusion detection framework for internet of things networks
… use of IP-based communications, interoperability between systems can be ensured by the
fact that the vast majority of IoT technologies support or are about to support the IP protocol (…
fact that the vast majority of IoT technologies support or are about to support the IP protocol (…
ID-Based SDN for the Internet of Things
… ) have the potential to meet the challenges of IoT security risks. To this aim, we propose an
ID-based SDN secure network architecture called IBSDN. Different from the traditional SDN …
ID-based SDN secure network architecture called IBSDN. Different from the traditional SDN …
[PDF][PDF] Layered Network Protocols for Secure Communications in the Internet of Things
Z Hu - University of Oregon: Eugene, OR, USA, 2021 - cs.uoregon.edu
… secure protocols on different networking layers. We aim to give a critical overview of the
security … for IP-based IoT devices to use compressed IPsec to secure communications in the …
security … for IP-based IoT devices to use compressed IPsec to secure communications in the …
Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture
… With respect to the prevailing IP-based Security Protocol (SecP… for communication and
interaction between the internet things. … adaptation layer is a feasible method to enable IP-based …
interaction between the internet things. … adaptation layer is a feasible method to enable IP-based …
[PDF][PDF] Exploring data security and privacy issues in internet of things based on five-layer architecture
… Also, section 4, provides general security guidelines for IoT. … layer called adaptation layer in
the 6LoWPAN protocol stack … and low cost IoT devices to the IP based network using IPv6 [29]…
the 6LoWPAN protocol stack … and low cost IoT devices to the IP based network using IPv6 [29]…
iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy
… In this article, we extend our previous work [26] to propose iTLS, the first lightweight secure
transport protocol for IPbased IoT, which can deliver the protected data in the first handshake …
transport protocol for IPbased IoT, which can deliver the protected data in the first handshake …