Slimfit—A HIP DEX compression layer for the IP-based Internet of things

R Hummen, J Hiller, M Henze… - 2013 IEEE 9th …, 2013 - ieeexplore.ieee.org
The HIP Diet EXchange (DEX) is an end-to-end security protocol designed for constrained
network environments in the IP-based Internet of Things (IoT). It is a variant of the IETF …

Data security and privacy in the internet of things (iot) environment

V Varadharajan, S Bansal - Connectivity frameworks for smart devices: the …, 2016 - Springer
Abstract Internet of Things (IoT) has already become an essential part of our daily lives, from
mobile phones connected to fitness bands and software applications (apps) controlling the …

Security, privacy and trust in Internet of Things: The road ahead

S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini - Computer networks, 2015 - Elsevier
Abstract Internet of Things (IoT) is characterized by heterogeneous technologies, which
concur to the provisioning of innovative services in various application domains. In this …

IOTSafe, decoupling security from applications for a safer IOT

JDDH Diego, J Saldana, J Fernández-Navajas… - IEEE …, 2019 - ieeexplore.ieee.org
The use of robust security solutions is a must for the Internet of Things (IoT) devices and their
applications: regulators in different countries are creating frameworks for certifying those …

Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity

M Dawson - Securing the internet of things: Concepts …, 2020 - igi-global.com
Secure computing is essential as environments continue to become intertwined and
hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of …

The Embedded Framework for Securing the Internet of Things.

AB Ferozkhan, G Anandharaj - Journal of Engineering Research, 2021 - kuwaitjournals.org
The smart devices connected on the internet turn to be the internet of things, which connect
other objects ordevices through unique identifiers with the capability of transferring and …

A mechanism for securing IoT-enabled applications at the fog layer

N Abbas, M Asim, N Tariq, T Baker… - Journal of Sensor and …, 2019 - mdpi.com
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous
technologies composed of smart ubiquitous objects that are seamlessly connected to the …

Security Challenges in the IP-based Internet of Things

T Heer, O Garcia-Morchon, R Hummen… - Wireless Personal …, 2011 - Springer
A direct interpretation of the term Internet of Things refers to the use of standard Internet
protocols for the human-to-thing or thing-to-thing communication in embedded networks …

Securing the IP-based internet of things with HIP and DTLS

O Garcia-Morchon, SL Keoh, S Kumar… - Proceedings of the sixth …, 2013 - dl.acm.org
The IP-based Internet of Things (IoT) refers to the pervasive interaction of smart devices and
people enabling new applications by means of new IP protocols such as 6LoWPAN and …

Security mechanisms for connectivity of smart devices in the internet of things

S Madakam, H Date - Connectivity Frameworks for Smart Devices: The …, 2016 - Springer
Abstract The Internet of Things, abbreviated as IoT, is one of the most hyped concepts in this
post-personal computer (PC) era. Gartner's information technology Hype Cycle also gives …