SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things

S Raza, T Helgason, P Papadimitratos… - Future Generation …, 2017 - Elsevier
Abstract Constrained Application Protocol (CoAP) has become the de-facto web standard for
the IoT. Unlike traditional wireless sensor networks, Internet-connected smart thing …

Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next wave of innovation that promises to improve and
optimize our daily life based on intelligent sensors and smart objects working together …

Fine-grained support of security services for resource constrained internet of things

HJ Ban, J Choi, N Kang - International Journal of Distributed …, 2016 - journals.sagepub.com
Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to
the Internet, thereby making smart and convenient daily life. Although users' daily lives can …

Secure and lightweight communication in heterogeneous IoT environments

F Siddiqui, J Beley, S Zeadally, G Braught - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) is a fast growing and rapidly evolving field. Everyday
objects from smart home appliances (eg toasters and refrigerators) to health monitoring …

Lithe: Lightweight secure CoAP for the internet of things

S Raza, H Shafagh, K Hewage, R Hummen… - IEEE sensors …, 2013 - ieeexplore.ieee.org
The Internet of Things (IoT) enables a wide range of application scenarios with potentially
critical actuating and sensing tasks, eg, in the e-health domain. For communication at the …

IoT–Cloud collaboration to establish a secure connection for lightweight devices

J Park, H Kwon, N Kang - Wireless Networks, 2017 - Springer
Abstract Internet of Things (IoT) technologies allow everyday objects including small devices
in sensor networks to be capable of connecting to the Internet. Such an innovative …

Trusted lightweight communication for IoT systems using hardware security

A Durand, P Gremaud, J Pasquier… - Proceedings of the 9th …, 2019 - dl.acm.org
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Cryptographic technologies and protocol standards for Internet of Things

S Zeadally, AK Das, N Sklavos - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) comprises physical/virtual networked objects that collect
and exchange data with each other via the public Internet. As this exchange often takes …

A survey of security and privacy issues in the Internet of Things from the layered context

S Deep, X Zheng, A Jolfaei, D Yu… - Transactions on …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is a novel paradigm, which not only facilitates a large
number of devices to be ubiquitously connected over the Internet but also provides a …