Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
… of) security protocol and security algorithms are also standardized to counter the the Internet
threat model [… There are many standards for Internet security protocols developed in different …

Lightweight security protocols for the Internet of Things

XW Wu, EH Yang, J Wang - 2017 IEEE 28th Annual …, 2017 - ieeexplore.ieee.org
… Our contributions include (1) a new suite of security protocols consisting of lightweight … (2)
security and efficiency analysis of our proposed suite of security protocols and its comparison …

Security in the internet of things: A survey on application layer protocols

L Nastase - 2017 21st international conference on control …, 2017 - ieeexplore.ieee.org
… Various solutions can be employed for binding a security layer to CoAP. The … security
protocols in the form they are used in association with TCP. Conversely, for some of such protocols

Security trends in Internet of Things: A survey

Rachit, S Bhatt, PR Ragiri - SN Applied Sciences, 2021 - Springer
… deployed IoT standards and protocols. We have presented a … security aspects, covering
identification of risks pertaining to the current IoT system, novel security protocols, and security

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… We need to provide secure protocols to efficiently handle and organize all these mass …
security solution for the entire application-related IoT system. This is similar to the Internet, which …

Internet of Things security: A survey

FA Alaba, M Othman, IAT Hashem, F Alotaibi - Journal of Network and …, 2017 - Elsevier
security that use different techniques. We present an IoT security taxonomy based on the
current security … Possible security threats and vulnerabilities of the IoT are also compared. We …

Networking protocols and standards for internet of things

T Salman, R Jain - Internet of things and data analytics …, 2017 - Wiley Online Library
… layer encapsulation protocols and Section 13.5 handles the session layer protocols. Section
… , and Section 13.7 describes security mechanisms in key protocols. Section 13.8 gives …

The Internet of Things: a security point of view

S Li, T Tryfonas, H Li - Internet Research, 2016 - emerald.com
… The purpose of this paper is to provide an in-depth overview of the security requirements
and challenges for Internet of Things (IoT) and discuss security solutions for various enabling …

Internet of things: architectures, protocols, and applications

P Sethi, SR Sarangi - Journal of electrical and computer …, 2017 - Wiley Online Library
… Along with physical and MAC layer protocols, we also need application layer protocols
for IoT networks. These lightweight protocols need to be able to carry application messages, …

Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art

Y Chahid, M Benabdellah, A Azizi - Proceedings of the 2nd International …, 2017 - dl.acm.org
… Finally, we find the NFC protocol which is a very secure protocol as already reported, its
consumption is very low compared to other protocol, but it weak point remains at the level of …