Transport in the IP-based Internet of Things: status report

JA Garcia-Macias - Procedia Computer Science, 2023 - Elsevier
… experimental testbed were end-to-end transport mode, the influence of the file size, loss ratio,
and RTT; their results showed that PA-UDP has the best transport performance. Mazirap et …

[PDF][PDF] A Survey of Protocols and End-To-End Security Models for Internet of Things

P Thapar, U Batra - academia.edu
… the security consideration in each protocol layer. Through this paper we present the analysis
of the end-to-end security … analyzing the end-to-end security models for Internet of Things. …

Hybrid end-to-end VPN security approach for smart IoT objects

M Juma, AA Monem, K Shaalan - Journal of Network and Computer …, 2020 - Elsevier
… separately to secure smart IoT objects in … End-to-End VPN security approach achieved by
combining the IPSec/IPv6 and OpenSSL security approaches that can secure smart IoT objects

New IP framework and protocol for future applications

Z Chen, C Wang, G Li, Z Lou, S Jiang… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
transport layer and network layer, serving as an identifier and a locator, the conventional IP
architecture cannot maintain an end-to-end … will allow legacy IP-based applications and IP-…

[HTML][HTML] Virtual IP-based secure gatekeeper system for internet of things

Y Jung, R Agulto - Sensors, 2020 - mdpi.com
… Secondly, the contribution of this paper is the introduction of the gatekeeper, which can
support end-to-end secure sessions between two IoTs located behind their gatekeepers. Security

Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture

VV Kumar, M Devi, PV Raja, P Kanmani, V Priya… - Microprocessors and …, 2020 - Elsevier
… heterogeneous multimedia things for communication and interaction between the internet
things. … We believe that a SecP adaptation layer is a feasible method to enable IP-based SecP …

End-to-end secure group communication for the Internet of Things

A Lizardo, R Barbosa, S Neves, J Correia… - … of Information Security …, 2021 - Elsevier
… To tackle these challenges, this paper proposes a protocol, named Sharelock, that
provides end-to-end security of messages exchanged by groups of communicating nodes. We …

Non-IP Based Communication in IoT: Handling Security Challenges

S Kumar, TP Singh, S Kumar - Communication Technologies and Security …, 2024 - Springer
… non-IP-based IoT communication and the associated security challenges. It commences
by elucidating non-IP communication systems and juxtaposing them with IP-basedend-to-end

[图书][B] Internet of Things Security

CK Wu, Wu - 2021 - Springer
… It is designed to connect small physical devices and RFID tags together over the networks,
particularly over the Internet. The networked things can be physical things without …

iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy

P Li, J Su, X Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… In this article, we have proposed iTLS, a lightweight TLS protocol for end-to-end secure
communication in the IP-based IoT. Compared with the existing solutions, iTLS is more …