TinyTO: Two-way authentication for constrained devices in the Internet of Things
C Schmitt, M Noack, B Stiller - Internet of Things, 2016 - Elsevier
Wireless sensor networks (WSN) will play a fundamental role in the future Internet of Things
(IoT), with millions of devices actively exchanging confidential information with one another …
(IoT), with millions of devices actively exchanging confidential information with one another …
A secure end-to-end IoT solution
Abstract The Internet of Things (IoT) has been expanding in recent years with advancements
in technologies, techniques and devices. This expansion has led to several different …
in technologies, techniques and devices. This expansion has led to several different …
6LowPSec: An end-to-end security protocol for 6LoWPAN
G Glissa, A Meddeb - Ad Hoc Networks, 2019 - Elsevier
Abstract 6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …
Security considerations for Internet of Things: A survey
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
[PDF][PDF] Evolution and Trends in the Security of the Internet of Things
The field of the Internet of Things (IoT) has evolved in the last few years: the amount and
diversity of devices that integrate connection capabilities is steadily growing, and both the …
diversity of devices that integrate connection capabilities is steadily growing, and both the …
Security in edge-assisted Internet of Things: challenges and solutions
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits
to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased …
to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased …
Security vulnerabilities and issues of traditional wireless sensors networks in IoT
K Gopalakrishnan - Principles of internet of things (IoT) ecosystem: Insight …, 2020 - Springer
From the past decade, Wireless sensor networks (WSNs) spread out significantly with the
result of technological progress in hardware, software, and micro electro mechanical …
result of technological progress in hardware, software, and micro electro mechanical …
Can IoT be secured: Emerging challenges in connecting the unconnected
N Cam-Winget, AR Sadeghi, Y Jin - Proceedings of the 53rd Annual …, 2016 - dl.acm.org
Embedded, mobile, and cyberphysical systems are becoming ubiquitous and are used in
many applications, from consumer electronics, industrial control systems, modern vehicles …
many applications, from consumer electronics, industrial control systems, modern vehicles …
Security comes first, a public-key cryptography framework for the internet of things
H Shafagh, A Hithnawi - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
Novel Internet services are emerging around an increasing number of sensors and actuators
in our surroundings, commonly referred to as smart devices. Smart devices, which form the …
in our surroundings, commonly referred to as smart devices. Smart devices, which form the …
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …