Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides … both real and virtual worlds,
security is becoming crucial for IoT … is to identify the security challenges and key issues that are …

Internet of Things: Security in the keys

S Sicari, A Rizzardi, D Miorandi… - … on qos and security for …, 2016 - dl.acm.org
… ; (ii) the global key table GTN , including one entry for each global key generated by NOS N
(Knode is equal to N); (iii) the local key table KTN , con- taining an entry for each local key K …

Security in internet of things: A survey

A Oracevic, S Dilek, S Ozdemir - 2017 international symposium …, 2017 - ieeexplore.ieee.org
Security with Symmetric Keys (S3K) - a highly scalable and flexible key management scheme
for DTLS security … it enables devices with no previous security relation to use DTLS as it …

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… in WSN is a key issue that the underlying security facilities need to be taken into consideration.
Energy consumption caused by public key encryption algorithms and security protocols …

[HTML][HTML] Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
… To build a reliable security shield, the challenges encountered must be embraced. Therefore…
security solutions. The survey of security solutions is not limited to traditional secret key-…

Security control redundancy allocation technology and security keys based on Internet of Things

A Yang, Y Li, F Kong, G Wang, E Chen - Ieee Access, 2018 - ieeexplore.ieee.org
Security key management applied to the security of the wireless sensor network and … the
security key management scheme based on early allocation in a variety of different security key

Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
… , use of hardware security modules to protect keys against tampering, software update
management, development and selection of efficient cryptographic primitives, etc. Custom …

[图书][B] Internet of Things Security

CK Wu, Wu - 2021 - Springer
… This monograph provides comprehensive security measures; each security measure has a
… authentication and key management. Chapter 6 presents some security requirements and …

A survey on the internet of things security

K Zhao, L Ge - … on computational intelligence and security, 2013 - ieeexplore.ieee.org
… of IoT security, this paper expounds several security issues … issues above coupled with key
technologies involved. Among … , including key management and algorithm, security routing …

Internet of Things security: a survey

MAM Sadeeq, SRM Zeebaree, R Qashi… - 2018 International …, 2018 - ieeexplore.ieee.org
… They generated two different security algorithms for Fc-MKA-KSE system, the first one can
record the key cyphertext ie the indistinguishability against selective file chosen keyword …