Towards security on internet of things: applications and challenges in technology
Abstract The Internet of Things (IoT) paradigm refers to the network of physical objects or"
things" embedded with electronics, software, sensors, and connectivity to enable objects to …
things" embedded with electronics, software, sensors, and connectivity to enable objects to …
Botnet detection by monitoring group activities in DNS traffic
Recent malicious attempts are intended to get financial benefits through a large pool of
compromised hosts, which are called software robots or simply" bots." A group of bots …
compromised hosts, which are called software robots or simply" bots." A group of bots …
A network-aware Internet-wide scan for security maximization of IPV6-enabled WLAN IoT devices
Despite unprecedented advancements, wireless local area network (WLAN) technologies
for the Internet of Things (IoT), such as IEEE 802.11 ah (ie, WiFi-HaLow), are prone to …
for the Internet of Things (IoT), such as IEEE 802.11 ah (ie, WiFi-HaLow), are prone to …
Lightweight key agreement protocol for IoT based on IKEv2
M Lavanya, V Natarajan - Computers & Electrical Engineering, 2017 - Elsevier
The future of wireless sensor networks is in providing IP connectivity to all the nodes in the
network. 6LoWPAN is an adaptation layer which allows the IEEE 802.15. 4 network to …
network. 6LoWPAN is an adaptation layer which allows the IEEE 802.15. 4 network to …
6LoWPAN multi-layered security protocol based on IEEE 802.15. 4 security features
G Glissa, A Meddeb - 2017 13th International Wireless …, 2017 - ieeexplore.ieee.org
Security should be an integral part of IoT communication stack facing vulnerabilities
imposed by protocol diversity. In this paper, we propose a new multilayer security protocol …
imposed by protocol diversity. In this paper, we propose a new multilayer security protocol …
Model learning and model checking of ipsec implementations for internet of things
J Guo, C Gu, X Chen, F Wei - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) technology, the demand for secure
communication by smart devices has dramatically increased, and the security of the IoT …
communication by smart devices has dramatically increased, and the security of the IoT …
A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks
D Alrababah, E Al-Shammari… - … Conference on New …, 2017 - ieeexplore.ieee.org
Internet of things (IoT) is a new technology that enables things in a specific environment to
communicate with each other over the internet. Objects need to communicate wirelessly with …
communicate with each other over the internet. Objects need to communicate wirelessly with …
On securing IEEE 802.15. 4 networks through a standard compliant framework
The IEEE 802.15. 4 standard is widely recognized as one of the most successful enabling
technologies for short range low rate wireless communications. Although it provides all the …
technologies for short range low rate wireless communications. Although it provides all the …
Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations
A El Hajjar - Wireless Networks: Cyber Security Threats and …, 2023 - Springer
Abstract The Internet of Things is the next evolution of the Internet which will substantially
affect human life. IoT is important because it is the first of its kind that is propelling an …
affect human life. IoT is important because it is the first of its kind that is propelling an …
[PDF][PDF] Security and key management challenges over Wsn (a survey)
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day
information technology, which supports the service-oriented architecture in a major activity …
information technology, which supports the service-oriented architecture in a major activity …