Security protocols and privacy issues into 6LoWPAN stack: A synthesis
C Hennebert, J Dos Santos - IEEE Internet of Things Journal, 2014 - ieeexplore.ieee.org
… : Protocol Stack of a WSN connected to Internet This article proposes a review of the security
protocols into the 6LoWPAN protocol … and developers of the Internet of Things to provide the …
protocols into the 6LoWPAN protocol … and developers of the Internet of Things to provide the …
Current research on Internet of Things (IoT) security: A survey
WH Hassan - Computer networks, 2019 - Elsevier
… for IoT security research. However, since many new security protocols are being proposed,
there is an urgent need for a security protocol evaluator, such as Automated Validation of …
there is an urgent need for a security protocol evaluator, such as Automated Validation of …
[HTML][HTML] A review of security concerns in Internet of Things
E Leloglu - Journal of Computer and Communications, 2017 - scirp.org
… and their use purposes in Internet security protocols based on studies [18] and [45] . …
layer, and IP security protocol (IPSec) is developed to keep the network layer secure. They can …
layer, and IP security protocol (IPSec) is developed to keep the network layer secure. They can …
Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities
MN Bhuiyan, MM Rahman, MM Billah… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… security, its requirements, challenges, and privacy issues are visualized in IoT surrounding
healthcare. In this review, we analyze security … the security problems, an IoT-based security …
healthcare. In this review, we analyze security … the security problems, an IoT-based security …
A survey on technologies and security protocols: Reference for future generation IoT
R Yugha, S Chithra - Journal of Network and Computer Applications, 2020 - Elsevier
… many security challenges in various domains. This paper discusses the existing IoT security
protocols on … Table 2 describes the protocol features, type of communication protocols and …
protocols on … Table 2 describes the protocol features, type of communication protocols and …
[HTML][HTML] A roadmap for security challenges in the Internet of Things
AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
… a potential impact broader than the Internet itself. To help interested researchers contribute
to this research area, an overview of the IoT security roadmap overview is presented in this …
to this research area, an overview of the IoT security roadmap overview is presented in this …
[PDF][PDF] A security protocol adaptation layer for the IP-based internet of things
… 2.1 A security protocol adaptation layer … the resulting security issues when connecting IoT
networks to the Internet, we argue that an adaptation layer for IP security protocols is necessary…
networks to the Internet, we argue that an adaptation layer for IP security protocols is necessary…
Internet of Things: Evolution and technologies from a security perspective
… own gain, referred to as cyber security attacks. By creating an introduction to IoT, this paper
seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader. …
seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader. …
Embedded security for Internet of Things
… many security protocols. In addition, secure embedded systems are vulnerable to attacks,
like physical tampering, malware and side-channel attacks. Thus, design of secure embedded …
like physical tampering, malware and side-channel attacks. Thus, design of secure embedded …
Internet of things: Security and solutions survey
… To give an overview of the IoT ecosystem, security threats, and respective solutions to the …
applications of IoT, different security threats, security mechanisms, authentication frameworks, …
applications of IoT, different security threats, security mechanisms, authentication frameworks, …