Compressed and distributed host identity protocol for end-to-end security in the IoT

S Sahraoui, A Bilami - 2014 International Conference on Next …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs), as a key part of the Internet of Things (IoT), allow the
representation of the dynamic characteristics of the physical world in the Internet's virtual …

Slimfit—A HIP DEX compression layer for the IP-based Internet of things

R Hummen, J Hiller, M Henze… - 2013 IEEE 9th …, 2013 - ieeexplore.ieee.org
The HIP Diet EXchange (DEX) is an end-to-end security protocol designed for constrained
network environments in the IP-based Internet of Things (IoT). It is a variant of the IETF …

Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things

S Sahraoui, A Bilami - Computer Networks, 2015 - Elsevier
Abstract The Internet of Things (IoT) is an emerging and promising paradigm that can be
considered as an extension of the Internet to interconnect all kinds of smart objects around …

On application of host identity protocol in wireless sensor networks

A Khurri, D Kuptsov, A Gurtov - … on Mobile Ad-hoc and Sensor …, 2010 - ieeexplore.ieee.org
Recent advances in development of low-cost wireless sensor platforms open up
opportunities for novel wireless sensor network (WSN) applications. Likewise emerge …

Implementing IPsec in wireless sensor networks

P Varadarajan, G Crosby - 2014 6th international conference on …, 2014 - ieeexplore.ieee.org
There is an increasing need for wireless sensor networks (WSNs) to be more tightly
integrated with the Internet. Several real world deployment of stand-alone wireless sensor …

A secure interconnection model for IPv6 enabled wireless sensor networks

J Granjal, E Monteiro, JSS Silva - 2010 IFIP Wireless Days, 2010 - ieeexplore.ieee.org
The usage of IPv6 on Wireless Sensor Networks (WSNs) can enable the integration of
existing and new sensing applications with the Internet, therefore contributing to a major …

Security comes first, a public-key cryptography framework for the internet of things

H Shafagh, A Hithnawi - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
Novel Internet services are emerging around an increasing number of sensors and actuators
in our surroundings, commonly referred to as smart devices. Smart devices, which form the …

Efficient key establishment for constrained IoT Devices with collaborative HIP-based approach

P Porambage, A Braeken, P Kumar… - 2015 IEEE global …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) technologies interconnect wide ranges of network devices
irrespective of their resource capabilities and local networks. The device constraints and the …

Integration of wireless sensor networks to the internet of things using a 6LoWPAN gateway

LF Schrickte, C Montez, R De Oliveira… - 2013 III Brazilian …, 2013 - ieeexplore.ieee.org
The Internet of Things is a new paradigm where smart embedded devices and systems are
connected to the Internet. In this context, Wireless Sensor Networks (WSN) are becoming an …

[HTML][HTML] LC-DEX: lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based …

B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
The high level of security requirements and low capabilities of constrained devices that are
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …