Cyberphysical security for the masses: A survey of the internet protocol suite for internet of things security
H Tschofenig, E Baccelli - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) deployments expand as IoT security lags. This article surveys IoT
security protocols standardized by the Internet Engineering Task Force and discusses …
security protocols standardized by the Internet Engineering Task Force and discusses …
[HTML][HTML] PKI4IoT: Towards public key infrastructure for the Internet of Things
J Höglund, S Lindemer, M Furuhed, S Raza - Computers & Security, 2020 - Elsevier
Abstract Public Key Infrastructure is the state-of-the-art credential management solution on
the Internet. However, the millions of constrained devices that make of the Internet of Things …
the Internet. However, the millions of constrained devices that make of the Internet of Things …
A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
Secure authentication and credential establishment in narrowband IoT and 5G
J Sanchez-Gomez, D Garcia-Carrillo, R Marin-Perez… - Sensors, 2020 - mdpi.com
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The
process of bootstrapping is required to establish a secure data exchange between IoT …
process of bootstrapping is required to establish a secure data exchange between IoT …
Application layer key establishment for end-to-end security in IoT
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
Security best practices: a critical analysis using IoT as a case study
Academic research has highlighted the failure of many Internet of Things (IoT) product
manufacturers to follow accepted practices, while IoT security best practices have recently …
manufacturers to follow accepted practices, while IoT security best practices have recently …
Enforcing behavioral profiles through software-defined networks in the industrial internet of things
The fourth industrial revolution is being mainly driven by the integration of Internet of Things
(IoT) technologies to support the development lifecycle of systems and products. Despite the …
(IoT) technologies to support the development lifecycle of systems and products. Despite the …
Extending MUD profiles through an automated IoT security testing methodology
Defining the intended behaviour of IoT devices is considered as a key aspect to detect and
mitigate potential security attacks. In this direction, the Manufacturer Usage Description …
mitigate potential security attacks. In this direction, the Manufacturer Usage Description …
Physical unclonable function (PUF)-based security in Internet of Things (IoT): Key challenges and solutions
Security protocols play a pivotal role in transmitting the sensitive application data through
packet switched and circuit switched data communication. State-of-the-art research comes …
packet switched and circuit switched data communication. State-of-the-art research comes …
Mitigation of privacy threats due to encrypted traffic analysis through a policy-based framework and MUD profiles
It has been proven in research literature that the analysis of encrypted traffic with statistical
analysis and machine learning can reveal the type of activities performed by a user …
analysis and machine learning can reveal the type of activities performed by a user …