[HTML][HTML] LC-DEX: lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based …

B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
The high level of security requirements and low capabilities of constrained devices that are
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …

Understanding security requirements and challenges in internet of things (IoTs): A review

FI Khan, S Hameed - arXiv preprint arXiv:1808.10529, 2018 - arxiv.org
Internet of Things (IoT) is realized by the idea of free flow of information amongst various low
power embedded devices that use Internet to communicate with one another. It is predicted …

Privacy and security issues in IoT healthcare applications for the disabled users a survey

W AL-mawee - 2012 - scholarworks.wmich.edu
Aging of the population resulted in new challenges for the society and healthcare systems.
Ambient Assisted Living (AAL) that depends on Internet of Things (IoT) provides assistance …

IoT powered agricultural cyber-physical system: Security issue assessment

E Kariri - IETE Journal of Research, 2022 - Taylor & Francis
Smart farming or development in agriculture Cyber-Physical Systems has led to the
development of various IOT based innovative platforms to aid automated systems for …

[HTML][HTML] PANATIKI: a network access control implementation based on PANA for IoT devices

PM Sanchez, RM Lopez, AF Gomez Skarmeta - Sensors, 2013 - mdpi.com
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities
or e-healthcare applications. Among other challenges, these networks cover the deployment …

Identity/identifier-enabled networks (IDEAS) for Internet of Things (IoT)

B Da, PP Esnault, S Hu, C Wang - … on Internet of Things (WF-IoT …, 2018 - ieeexplore.ieee.org
Future Networks have proposed many Identifier/Locator Split (ILS) schemes in the past
decade, and these ILS solutions are being recently considered for diverse IoT applications …

Internet of things security: challenges and perspectives

A Harit, A Ezzati, R Elharti - … of the Second International Conference on …, 2017 - dl.acm.org
No one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its
many benefits in order to improve and simplify people's lives. Us any new technology the …

Enhancing identifier/locator splitting through social internet of things

L Atzori, C Campolo, B Da, R Girau… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
In recent years identifier/locator splitting (ILS) has been proposed as a promising future
Internet solution to the so-called “semantic overload of addresses” problem. It is currently …

Physical unclonable function based authentication protocol for unit IoT and ubiquitous IoT

M Zhao, X Yao, H Liu, H Ning - … in the Internet of Things (IIKI), 2016 - ieeexplore.ieee.org
Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive
interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to …

[PDF][PDF] Understanding of Network Resiliency in Communication Networks with its Integration in Internet of Things-A Survey.

S Sharma, BK Pathak, R Kumar - Electrica, 2023 - electricajournal.org
Modern life is completely dependent on Internet, and as a result, network disruption has
become extremely severe. It has been recognized that communication networks are not that …