P-hip: A lightweight and privacy-aware host identity protocol for internet of things

M Hossain, R Hasan - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… 3) We provide a security analysis of P-HIP which shows that … We compared the resource
efficiency of P-HIP with the RSA-based … for HIP-based Internet of Things,” in Proc. 3rd Int. Conf. …

… : lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based internet of things

B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
… In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) … ,
constitute an efficient security solution for IoT. We called our solution Lightweight Compressed …

S-HIP: Simplified HIP Protocol for IoT Networks

P Kanuch, D Macko, L Hudec - 2022 45th International …, 2022 - ieeexplore.ieee.org
… to secure IoT communication, making it more energy efficient by combining multiple approaches.
We … In our work, we summarised several HIP-based (Host Identity Protocol) protocols, …

Efficient reduction of the transmission delay of the authentication based elliptic curve cryptography in 6LoWPAN wireless sensor networks in the Internet of Things

B Bettoumi, R Bouallegue - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
… In this paper, we contribute by an efficient minimization of End-toEnd (… We compare our
results with HIP-based solutions and … Bilami, “Efficient HIP-based approach to ensure lightweight

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
… Moreover, the available effective techniques to secure the IoT … , we provide a survey on
these HIP-based security schemes. … Authentication and encryption techniques protect end-to-end

IoT and HIP's opportunistic mode

A Fuchs, A Stulman, A Gurtov - IEEE Transactions on Mobile …, 2020 - ieeexplore.ieee.org
… is necessary to establish secure end-to-end (E2E) connections … efficient key establishment
for constrained devices in InternetHIP based Internet of Things,” in Proc. 10th ACM Int. Symp. …

Enhancing Internet Security and Mobility with Host Identity Protocol: Integration, Testing, and Optimization: Simulation of HIP-VPLS using Mininet

M Christensson, E De Paz - 2024 - diva-portal.org
… for which no efficient general solution method is currently known… It uses lightweight virtualization
to make a single system look … buffer sizing ensures that networks can operate efficiently, …

Securing human‐to‐thing interactions in the Internet of Things with asymmetric and selective mechanism

S Sahraoui, A Bilami - Security and Privacy, 2021 - Wiley Online Library
… The assessment results show the efficiency of our proposal. … host and the CoAP server, as
well as with a HIP-based automatic … proposed a solution to ensure end-to-end security for H2T …

[PDF][PDF] Lightweight secure MQTT for mobility enabled e-health internet of things.

A Bashir, AH Mir - Int. Arab J. Inf. Technol., 2021 - ccis2k.org
… Along with end-to-end data confidentiality, our scheme … Therefore, our scheme, being energy
efficient, provides end-to-end data … A., “Efficient HIP-Based Approach to Ensure Lightweight

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… the weak credentials used by the end-to-end lightweight security protocol and poison the …
Efficient HIP-based approach to ensure lightweight end-to-end security in the Internet of Things