P-hip: A lightweight and privacy-aware host identity protocol for internet of things
… 3) We provide a security analysis of P-HIP which shows that … We compared the resource
efficiency of P-HIP with the RSA-based … for HIP-based Internet of Things,” in Proc. 3rd Int. Conf. …
efficiency of P-HIP with the RSA-based … for HIP-based Internet of Things,” in Proc. 3rd Int. Conf. …
… : lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based internet of things
B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
… In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) … ,
constitute an efficient security solution for IoT. We called our solution Lightweight Compressed …
constitute an efficient security solution for IoT. We called our solution Lightweight Compressed …
S-HIP: Simplified HIP Protocol for IoT Networks
… to secure IoT communication, making it more energy efficient by combining multiple approaches.
We … In our work, we summarised several HIP-based (Host Identity Protocol) protocols, …
We … In our work, we summarised several HIP-based (Host Identity Protocol) protocols, …
Efficient reduction of the transmission delay of the authentication based elliptic curve cryptography in 6LoWPAN wireless sensor networks in the Internet of Things
B Bettoumi, R Bouallegue - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
… In this paper, we contribute by an efficient minimization of End-toEnd (… We compare our
results with HIP-based solutions and … Bilami, “Efficient HIP-based approach to ensure lightweight …
results with HIP-based solutions and … Bilami, “Efficient HIP-based approach to ensure lightweight …
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
… Moreover, the available effective techniques to secure the IoT … , we provide a survey on
these HIP-based security schemes. … Authentication and encryption techniques protect end-to-end …
these HIP-based security schemes. … Authentication and encryption techniques protect end-to-end …
IoT and HIP's opportunistic mode
… is necessary to establish secure end-to-end (E2E) connections … efficient key establishment
for constrained devices in Internet … HIP based Internet of Things,” in Proc. 10th ACM Int. Symp. …
for constrained devices in Internet … HIP based Internet of Things,” in Proc. 10th ACM Int. Symp. …
Enhancing Internet Security and Mobility with Host Identity Protocol: Integration, Testing, and Optimization: Simulation of HIP-VPLS using Mininet
M Christensson, E De Paz - 2024 - diva-portal.org
… for which no efficient general solution method is currently known… It uses lightweight virtualization
to make a single system look … buffer sizing ensures that networks can operate efficiently, …
to make a single system look … buffer sizing ensures that networks can operate efficiently, …
Securing human‐to‐thing interactions in the Internet of Things with asymmetric and selective mechanism
S Sahraoui, A Bilami - Security and Privacy, 2021 - Wiley Online Library
… The assessment results show the efficiency of our proposal. … host and the CoAP server, as
well as with a HIP-based automatic … proposed a solution to ensure end-to-end security for H2T …
well as with a HIP-based automatic … proposed a solution to ensure end-to-end security for H2T …
[PDF][PDF] Lightweight secure MQTT for mobility enabled e-health internet of things.
A Bashir, AH Mir - Int. Arab J. Inf. Technol., 2021 - ccis2k.org
… Along with end-to-end data confidentiality, our scheme … Therefore, our scheme, being energy
efficient, provides end-to-end data … A., “Efficient HIP-Based Approach to Ensure Lightweight …
efficient, provides end-to-end data … A., “Efficient HIP-Based Approach to Ensure Lightweight …
Lightweight cryptographic protocols for IoT-constrained devices: A survey
… the weak credentials used by the end-to-end lightweight security protocol and poison the …
Efficient HIP-based approach to ensure lightweight end-to-end security in the Internet of Things…
Efficient HIP-based approach to ensure lightweight end-to-end security in the Internet of Things…