Internet of things security-multilayered method for end to end data communications over cellular networks

C Lee, A Fumagalli - … 5th World Forum on Internet of Things  …, 2019 - ieeexplore.ieee.org
… growth of Internet of Things (IoT) solutions comes the greater concern over security issues
… for securely establishing end-to-end TCP/IP based Internet of Things communications over …

6LowPSec: An end-to-end security protocol for 6LoWPAN

G Glissa, A Meddeb - Ad Hoc Networks, 2019 - Elsevier
… and the header compression to forward 6LoWPAN packets between WSNs and the Internet
[18]. Security is one of the major issues that must be addressed for such networks [19], [20]. …

Application layer key establishment for end-to-end security in IoT

S Pérez, JL Hernández-Ramos, S Raza… - … Internet of Things …, 2019 - ieeexplore.ieee.org
… well-known issues associated with the integration of security … of end-to-end security properties
more difficult to be ensured. … , “Securing the ip-based internet of things with hip and dtls,” …

Hybrid end-to-end VPN security approach for smart IoT objects

M Juma, AA Monem, K Shaalan - Journal of Network and Computer …, 2020 - Elsevier
End-to-End VPN security approach achieved by combining the IPSec/IPv6 and OpenSSL
security approaches that can secure smart IoT objects in … This paper deals with the main issues

Security for internet of things: A state of the art on existing protocols and open research issues

C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
… A large number of applications utilize 6LoWPAN for IP-based communication through an …
at the MAC and at the adaptation layers, offering both end-to-end and hop-by-hop security

[图书][B] Internet of Things Security

CK Wu, Wu - 2021 - Springer
about the concept of IoT, the components of IoT, some typical applications of IoT, and
security issues … Veltri, Enforcing security mechanisms in the IP-based Internet of things: an …

End-to-end secure group communication for the Internet of Things

A Lizardo, R Barbosa, S Neves, J Correia… - … of Information Security …, 2021 - Elsevier
… , named Sharelock, that provides end-to-end security of messages exchanged by groups
of … even at 128 bits. The same considerations apply to symmetric authentication primitives. …

[PDF][PDF] A Survey of Protocols and End-To-End Security Models for Internet of Things

P Thapar, U Batra - academia.edu
… devices forming Internet of Things. We then cover the security consideration in each
protocol layer. Through this paper we present the analysis of the end-to-end security models …

Addressing security issues and standards in Internet of things

S Mishra, S Sahoo, BK Mishra - Emerging trends and applications in …, 2019 - igi-global.com
… gateways to connect devices with the IP-based networks (ie, the Internet). Recently, the … to
the NS-3 simulator with a full end-to-end topology over the LTE protocol stack; then based on …

Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture

VV Kumar, M Devi, PV Raja, P Kanmani, V Priya… - Microprocessors and …, 2020 - Elsevier
… With respect to the prevailing IP-based Security Protocol (… on finding the tasks and the
security issues prevailing in IoT. … for communication and interaction between the internet things. …