Securing the internet of things: A standardization perspective
… of) security protocol and security algorithms are also standardized to counter the the Internet
threat model [… There are many standards for Internet security protocols developed in different …
threat model [… There are many standards for Internet security protocols developed in different …
Lightweight security protocols for the Internet of Things
… Our contributions include (1) a new suite of security protocols consisting of lightweight … (2)
security and efficiency analysis of our proposed suite of security protocols and its comparison …
security and efficiency analysis of our proposed suite of security protocols and its comparison …
Security in the internet of things: A survey on application layer protocols
L Nastase - 2017 21st international conference on control …, 2017 - ieeexplore.ieee.org
… Various solutions can be employed for binding a security layer to CoAP. The … security
protocols in the form they are used in association with TCP. Conversely, for some of such protocols …
protocols in the form they are used in association with TCP. Conversely, for some of such protocols …
Security trends in Internet of Things: A survey
… deployed IoT standards and protocols. We have presented a … security aspects, covering
identification of risks pertaining to the current IoT system, novel security protocols, and security …
identification of risks pertaining to the current IoT system, novel security protocols, and security …
Security of the Internet of Things: perspectives and challenges
Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… We need to provide secure protocols to efficiently handle and organize all these mass …
security solution for the entire application-related IoT system. This is similar to the Internet, which …
security solution for the entire application-related IoT system. This is similar to the Internet, which …
Internet of Things security: A survey
FA Alaba, M Othman, IAT Hashem, F Alotaibi - Journal of Network and …, 2017 - Elsevier
… security that use different techniques. We present an IoT security taxonomy based on the
current security … Possible security threats and vulnerabilities of the IoT are also compared. We …
current security … Possible security threats and vulnerabilities of the IoT are also compared. We …
Networking protocols and standards for internet of things
… layer encapsulation protocols and Section 13.5 handles the session layer protocols. Section
… , and Section 13.7 describes security mechanisms in key protocols. Section 13.8 gives …
… , and Section 13.7 describes security mechanisms in key protocols. Section 13.8 gives …
The Internet of Things: a security point of view
… The purpose of this paper is to provide an in-depth overview of the security requirements
and challenges for Internet of Things (IoT) and discuss security solutions for various enabling …
and challenges for Internet of Things (IoT) and discuss security solutions for various enabling …
Internet of things: architectures, protocols, and applications
P Sethi, SR Sarangi - Journal of electrical and computer …, 2017 - Wiley Online Library
… Along with physical and MAC layer protocols, we also need application layer protocols
for IoT networks. These lightweight protocols need to be able to carry application messages, …
for IoT networks. These lightweight protocols need to be able to carry application messages, …
Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art
Y Chahid, M Benabdellah, A Azizi - Proceedings of the 2nd International …, 2017 - dl.acm.org
… Finally, we find the NFC protocol which is a very secure protocol as already reported, its
consumption is very low compared to other protocol, but it weak point remains at the level of …
consumption is very low compared to other protocol, but it weak point remains at the level of …