Transport in the IP-based Internet of Things: status report
JA Garcia-Macias - Procedia Computer Science, 2023 - Elsevier
… experimental testbed were end-to-end transport mode, the influence of the file size, loss ratio,
and RTT; their results showed that PA-UDP has the best transport performance. Mazirap et …
and RTT; their results showed that PA-UDP has the best transport performance. Mazirap et …
[PDF][PDF] A Survey of Protocols and End-To-End Security Models for Internet of Things
P Thapar, U Batra - academia.edu
… the security consideration in each protocol layer. Through this paper we present the analysis
of the end-to-end security … analyzing the end-to-end security models for Internet of Things. …
of the end-to-end security … analyzing the end-to-end security models for Internet of Things. …
Hybrid end-to-end VPN security approach for smart IoT objects
… separately to secure smart IoT objects in … End-to-End VPN security approach achieved by
combining the IPSec/IPv6 and OpenSSL security approaches that can secure smart IoT objects …
combining the IPSec/IPv6 and OpenSSL security approaches that can secure smart IoT objects …
New IP framework and protocol for future applications
Z Chen, C Wang, G Li, Z Lou, S Jiang… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
… transport layer and network layer, serving as an identifier and a locator, the conventional IP
architecture cannot maintain an end-to-end … will allow legacy IP-based applications and IP-…
architecture cannot maintain an end-to-end … will allow legacy IP-based applications and IP-…
[HTML][HTML] Virtual IP-based secure gatekeeper system for internet of things
… Secondly, the contribution of this paper is the introduction of the gatekeeper, which can
support end-to-end secure sessions between two IoTs located behind their gatekeepers. Security …
support end-to-end secure sessions between two IoTs located behind their gatekeepers. Security …
Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture
… heterogeneous multimedia things for communication and interaction between the internet
things. … We believe that a SecP adaptation layer is a feasible method to enable IP-based SecP …
things. … We believe that a SecP adaptation layer is a feasible method to enable IP-based SecP …
End-to-end secure group communication for the Internet of Things
… To tackle these challenges, this paper proposes a protocol, named Sharelock, that
provides end-to-end security of messages exchanged by groups of communicating nodes. We …
provides end-to-end security of messages exchanged by groups of communicating nodes. We …
Non-IP Based Communication in IoT: Handling Security Challenges
… non-IP-based IoT communication and the associated security challenges. It commences
by elucidating non-IP communication systems and juxtaposing them with IP-based … end-to-end …
by elucidating non-IP communication systems and juxtaposing them with IP-based … end-to-end …
[图书][B] Internet of Things Security
CK Wu, Wu - 2021 - Springer
… It is designed to connect small physical devices and RFID tags together over the networks,
particularly over the Internet. The networked things can be physical things without …
particularly over the Internet. The networked things can be physical things without …
iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy
… In this article, we have proposed iTLS, a lightweight TLS protocol for end-to-end secure
communication in the IP-based IoT. Compared with the existing solutions, iTLS is more …
communication in the IP-based IoT. Compared with the existing solutions, iTLS is more …