TinyTO: Two-way authentication for constrained devices in the Internet of Things

C Schmitt, M Noack, B Stiller - Internet of Things, 2016 - Elsevier
Wireless sensor networks (WSN) will play a fundamental role in the future Internet of Things
(IoT), with millions of devices actively exchanging confidential information with one another …

A secure end-to-end IoT solution

A Mathur, T Newe, W Elgenaidi, M Rao, G Dooly… - Sensors and Actuators A …, 2017 - Elsevier
Abstract The Internet of Things (IoT) has been expanding in recent years with advancements
in technologies, techniques and devices. This expansion has led to several different …

6LowPSec: An end-to-end security protocol for 6LoWPAN

G Glissa, A Meddeb - Ad Hoc Networks, 2019 - Elsevier
Abstract 6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

[PDF][PDF] Evolution and Trends in the Security of the Internet of Things

R Roman, J Lopez, S Gritzalis - IEEE Computer, 2018 - nics.uma.es
The field of the Internet of Things (IoT) has evolved in the last few years: the amount and
diversity of devices that integrate connection capabilities is steadily growing, and both the …

Security in edge-assisted Internet of Things: challenges and solutions

SQ Shen, K Zhang, Y Zhou, S Ci - Science China Information Sciences, 2020 - Springer
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits
to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased …

Security vulnerabilities and issues of traditional wireless sensors networks in IoT

K Gopalakrishnan - Principles of internet of things (IoT) ecosystem: Insight …, 2020 - Springer
From the past decade, Wireless sensor networks (WSNs) spread out significantly with the
result of technological progress in hardware, software, and micro electro mechanical …

Can IoT be secured: Emerging challenges in connecting the unconnected

N Cam-Winget, AR Sadeghi, Y Jin - Proceedings of the 53rd Annual …, 2016 - dl.acm.org
Embedded, mobile, and cyberphysical systems are becoming ubiquitous and are used in
many applications, from consumer electronics, industrial control systems, modern vehicles …

Security comes first, a public-key cryptography framework for the internet of things

H Shafagh, A Hithnawi - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
Novel Internet services are emerging around an increasing number of sensors and actuators
in our surroundings, commonly referred to as smart devices. Smart devices, which form the …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …