Security protocols and privacy issues into 6LoWPAN stack: A synthesis

C Hennebert, J Dos Santos - IEEE Internet of Things Journal, 2014 - ieeexplore.ieee.org
… : Protocol Stack of a WSN connected to Internet This article proposes a review of the security
protocols into the 6LoWPAN protocol … and developers of the Internet of Things to provide the …

Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
… for IoT security research. However, since many new security protocols are being proposed,
there is an urgent need for a security protocol evaluator, such as Automated Validation of …

[HTML][HTML] A review of security concerns in Internet of Things

E Leloglu - Journal of Computer and Communications, 2017 - scirp.org
… and their use purposes in Internet security protocols based on studies [18] and [45] . …
layer, and IP security protocol (IPSec) is developed to keep the network layer secure. They can …

Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities

MN Bhuiyan, MM Rahman, MM Billah… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
security, its requirements, challenges, and privacy issues are visualized in IoT surrounding
healthcare. In this review, we analyze security … the security problems, an IoT-based security

A survey on technologies and security protocols: Reference for future generation IoT

R Yugha, S Chithra - Journal of Network and Computer Applications, 2020 - Elsevier
… many security challenges in various domains. This paper discusses the existing IoT security
protocols on … Table 2 describes the protocol features, type of communication protocols and …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
… a potential impact broader than the Internet itself. To help interested researchers contribute
to this research area, an overview of the IoT security roadmap overview is presented in this …

[PDF][PDF] A security protocol adaptation layer for the IP-based internet of things

R Hummen, T Heer, K Wehrle - … smart objects with the Internet …, 2011 - researchgate.net
… 2.1 A security protocol adaptation layer … the resulting security issues when connecting IoT
networks to the Internet, we argue that an adaptation layer for IP security protocols is necessary…

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
… own gain, referred to as cyber security attacks. By creating an introduction to IoT, this paper
seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader. …

Embedded security for Internet of Things

A Ukil, J Sen, S Koilakonda - 2011 2nd National Conference on …, 2011 - ieeexplore.ieee.org
… many security protocols. In addition, secure embedded systems are vulnerable to attacks,
like physical tampering, malware and side-channel attacks. Thus, design of secure embedded …

Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
… To give an overview of the IoT ecosystem, security threats, and respective solutions to the …
applications of IoT, different security threats, security mechanisms, authentication frameworks, …