Challenges of securing Internet of Things devices: A survey

MG Samaila, M Neto, DAB Fernandes… - Security and …, 2018 - Wiley Online Library
The current vision of the Internet of Things (IoT) is to ensure that everything from everywhere
is connected to the Internet at all times using Internet Protocol (IP). This idea has the …

Understanding security requirements and challenges in internet of things (IoTs): A review

FI Khan, S Hameed - arXiv preprint arXiv:1808.10529, 2018 - arxiv.org
Internet of Things (IoT) is realized by the idea of free flow of information amongst various low
power embedded devices that use Internet to communicate with one another. It is predicted …

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading

R Hasan, M Hossain, R Khan - Future Generation Computer Systems, 2018 - Elsevier
The rapid growth of mobile applications requires enhanced computational resources in
order to ensure better performance, security, and usability. In recent years, the proliferation …

Protecting personal data in IoT platform scenarios through encryption-based selective disclosure

JL Hernández-Ramos, S Pérez, C Hennebert… - Computer …, 2018 - Elsevier
Abstract As the Internet of Things evolves, citizens are starting to change the way they share
information and communicate with their surrounding environment, enabling a constant …

Tinyike: Lightweight ikev2 for internet of things

S Raza, RM Magnússon - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
There is unanimous consensus that cyber security in the Internet of Things (IoT) is
necessary. In cyber security, key establishment is one of the toughest problems. It is even …

Towards a holistic framework for secure, privacy-aware, and trustworthy internet of things using resource-efficient cryptographic schemes

M Hossain - 2018 - search.proquest.com
The increased deployment of Internet of Things (IoT) based systems make smart devices
target for malicious attacks. These devices can also be used as tools for committing crimes …

Key establishment for constrained resource devices

G Selander - US Patent 10,158,608, 2018 - Google Patents
It is disclosed a method and a constrained resource device (502, 70, 90) for establishing a
secret first key between a client device (506) and the constrained resource device. The …

Lightweight authentication and key management of wireless sensor networks for Internet of things

P Porambage - 2018 - oulurepo.oulu.fi
The concept of the Internet of Things (IoT) is driven by advancements of the Internet with the
interconnection of heterogeneous smart objects using different networking and …

A Network Telescope Approach for Inferring and Characterizing IoT Exploitations

N Neshenko - 2018 - search.proquest.com
While the seamless interconnection of IoT devices with the physical realm is envisioned to
bring a plethora of critical improvements on many aspects and in diverse domains, it will …

[PDF][PDF] HIP-protokollan käyttömahdollisuudet esineiden internetissä

EV Piki - 2018 - trepo.tuni.fi
Host Identity Protocol (HIP) on verkottamisarkkitehtuuri, jolla voidaan totetuttaa esineiden
internetille hyödyllisiä toiminnallisia ja tietoturvaa parantavia ominaisuuksia. HIP-protokollan …