Security protocols for Internet of Things: A survey

S Deshmukh, SS Sonavane - 2017 International conference on …, 2017 - ieeexplore.ieee.org
… In this paper, we have carried out a thorough analysis of the security protocols and
mechanisms available to protect communications on the IoT. The majority of security protocols are …

Taxonomy and analysis of security protocols for Internet of Things

AK Das, S Zeadally, D He - Future Generation Computer Systems, 2018 - Elsevier
… important security services … -art security protocols in terms of various security and functionality
features they support. Finally, we discuss some future challenges for IoT security protocols

Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
… into these security protocols and techniques. Indeed, we will not focus on specific security
properties … We will look closer at the security protocol itself, how it is constructed, which security

Security Challenges in the IP-based Internet of Things

T Heer, O Garcia-Morchon, R Hummen… - Wireless Personal …, 2011 - Springer
… a thing in a BAC application, this paper reviewed the architectural design for a secure IP-based
Internet of Things and its challenges with special focus on standard IP security protocols. …

A survey of protocols and standards for internet of things

T Salman, R Jain - arXiv preprint arXiv:1903.11549, 2019 - arxiv.org
… , network and session layer protocols that are being developed to meet IoT requirements.
The discussion also includes management and security protocols in addition to the current …

Performance evaluation of end-to-end security protocols in an internet of things

A De Rubertis, L Mainetti, V Mighali… - 2013 21st …, 2013 - ieeexplore.ieee.org
security solution for any applicative scenario does not exist, but the use of one protocol with
… Section II gives an overview on the security protocols used in our performance evaluation. …

Tailoring end-to-end IP security protocols to the Internet of Things

R Hummen, H Wirtz, JH Ziegeldorf… - … Network Protocols  …, 2013 - ieeexplore.ieee.org
… In this section, we identify performance and security issues in end-to-end IP security protocols
that apply publickey cryptography in constrained environments. We specifically quantify …

Security for internet of things: A state of the art on existing protocols and open research issues

C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
security mechanisms widely used on the Internet are too heavy to be integrated on small
constrained objects. Therefore, we need secure protocols or add a security … impact the security. …

Internet of Things: Existing protocols and technological challenges in security

H Sardeshmukh, D Ambawade - … International Conference on …, 2017 - ieeexplore.ieee.org
… IoT protocol stack and some of the most commonly used protocols and comparison of it from
security … various challenges related to security from aspect of protocols, network and device. …

Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
… of) security protocol and security algorithms are also standardized to counter the the Internet
threat model [… There are many standards for Internet security protocols developed in different …