Slimfit—A HIP DEX compression layer for the IP-based Internet of things
The HIP Diet EXchange (DEX) is an end-to-end security protocol designed for constrained
network environments in the IP-based Internet of Things (IoT). It is a variant of the IETF …
network environments in the IP-based Internet of Things (IoT). It is a variant of the IETF …
Data security and privacy in the internet of things (iot) environment
V Varadharajan, S Bansal - Connectivity frameworks for smart devices: the …, 2016 - Springer
Abstract Internet of Things (IoT) has already become an essential part of our daily lives, from
mobile phones connected to fitness bands and software applications (apps) controlling the …
mobile phones connected to fitness bands and software applications (apps) controlling the …
Security, privacy and trust in Internet of Things: The road ahead
Abstract Internet of Things (IoT) is characterized by heterogeneous technologies, which
concur to the provisioning of innovative services in various application domains. In this …
concur to the provisioning of innovative services in various application domains. In this …
IOTSafe, decoupling security from applications for a safer IOT
The use of robust security solutions is a must for the Internet of Things (IoT) devices and their
applications: regulators in different countries are creating frameworks for certifying those …
applications: regulators in different countries are creating frameworks for certifying those …
Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity
M Dawson - Securing the internet of things: Concepts …, 2020 - igi-global.com
Secure computing is essential as environments continue to become intertwined and
hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of …
hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of …
The Embedded Framework for Securing the Internet of Things.
AB Ferozkhan, G Anandharaj - Journal of Engineering Research, 2021 - kuwaitjournals.org
The smart devices connected on the internet turn to be the internet of things, which connect
other objects ordevices through unique identifiers with the capability of transferring and …
other objects ordevices through unique identifiers with the capability of transferring and …
A mechanism for securing IoT-enabled applications at the fog layer
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous
technologies composed of smart ubiquitous objects that are seamlessly connected to the …
technologies composed of smart ubiquitous objects that are seamlessly connected to the …
Security Challenges in the IP-based Internet of Things
A direct interpretation of the term Internet of Things refers to the use of standard Internet
protocols for the human-to-thing or thing-to-thing communication in embedded networks …
protocols for the human-to-thing or thing-to-thing communication in embedded networks …
Securing the IP-based internet of things with HIP and DTLS
The IP-based Internet of Things (IoT) refers to the pervasive interaction of smart devices and
people enabling new applications by means of new IP protocols such as 6LoWPAN and …
people enabling new applications by means of new IP protocols such as 6LoWPAN and …
Security mechanisms for connectivity of smart devices in the internet of things
S Madakam, H Date - Connectivity Frameworks for Smart Devices: The …, 2016 - Springer
Abstract The Internet of Things, abbreviated as IoT, is one of the most hyped concepts in this
post-personal computer (PC) era. Gartner's information technology Hype Cycle also gives …
post-personal computer (PC) era. Gartner's information technology Hype Cycle also gives …