Cyberphysical security for the masses: A survey of the internet protocol suite for internet of things security

H Tschofenig, E Baccelli - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) deployments expand as IoT security lags. This article surveys IoT
security protocols standardized by the Internet Engineering Task Force and discusses …

[HTML][HTML] PKI4IoT: Towards public key infrastructure for the Internet of Things

J Höglund, S Lindemer, M Furuhed, S Raza - Computers & Security, 2020 - Elsevier
Abstract Public Key Infrastructure is the state-of-the-art credential management solution on
the Internet. However, the millions of constrained devices that make of the Internet of Things …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Secure authentication and credential establishment in narrowband IoT and 5G

J Sanchez-Gomez, D Garcia-Carrillo, R Marin-Perez… - Sensors, 2020 - mdpi.com
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The
process of bootstrapping is required to establish a secure data exchange between IoT …

Application layer key establishment for end-to-end security in IoT

S Pérez, JL Hernández-Ramos, S Raza… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …

Security best practices: a critical analysis using IoT as a case study

D Barrera, C Bellman, P Van Oorschot - ACM Transactions on Privacy …, 2023 - dl.acm.org
Academic research has highlighted the failure of many Internet of Things (IoT) product
manufacturers to follow accepted practices, while IoT security best practices have recently …

Enforcing behavioral profiles through software-defined networks in the industrial internet of things

SNM García, A Molina Zarca, JL Hernández-Ramos… - Applied Sciences, 2019 - mdpi.com
The fourth industrial revolution is being mainly driven by the integration of Internet of Things
(IoT) technologies to support the development lifecycle of systems and products. Despite the …

Extending MUD profiles through an automated IoT security testing methodology

SN Matheu, JL Hernández-Ramos, S Pérez… - IEEE …, 2019 - ieeexplore.ieee.org
Defining the intended behaviour of IoT devices is considered as a key aspect to detect and
mitigate potential security attacks. In this direction, the Manufacturer Usage Description …

Physical unclonable function (PUF)-based security in Internet of Things (IoT): Key challenges and solutions

MS Alkatheiri, AR Sangi, S Anamalamudi - Handbook of Computer …, 2020 - Springer
Security protocols play a pivotal role in transmitting the sensitive application data through
packet switched and circuit switched data communication. State-of-the-art research comes …

Mitigation of privacy threats due to encrypted traffic analysis through a policy-based framework and MUD profiles

G Baldini, JL Hernandez-Ramos, S Nowak, R Neisse… - Symmetry, 2020 - mdpi.com
It has been proven in research literature that the analysis of encrypted traffic with statistical
analysis and machine learning can reveal the type of activities performed by a user …