IoT security: Review, blockchain solutions, and open challenges

MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …

Security in IoMT communications: A survey

D Koutras, G Stergiopoulos, T Dasaklis… - Sensors, 2020 - mdpi.com
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …

A survey of IoT protocols and their security issues through the lens of a generic IoT stack

J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …

IETF standardization in the field of the internet of things (IoT): a survey

I Ishaq, D Carels, GK Teklemariam, J Hoebeke… - Journal of Sensor and …, 2013 - mdpi.com
Smart embedded objects will become an important part of what is called the Internet of
Things. However, the integration of embedded devices into the Internet introduces several …

Security analysis of IoT protocols: A focus in CoAP

RA Rahman, B Shah - … 3rd MEC international conference on big …, 2016 - ieeexplore.ieee.org
Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart products
or smart things connected to the internet. It is a new and fast developing market which not …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

Cloud-based vs. blockchain-based IoT: a comparative survey and way forward

RA Memon, JP Li, J Ahmed, MI Nazeer… - Frontiers of Information …, 2020 - Springer
Abstract The Internet of Things (IoT) has been evolving for more than a decade.
Technological advancements have increased its popularity, but concerns and risks related …

Security analysis of the constrained application protocol in the Internet of Things

TA Alghamdi, A Lasebae… - … international conference on …, 2013 - ieeexplore.ieee.org
The concept of Internet of Things involves huge number of constrained devices such as
wireless sensors to communicate in a machine-to-machine pattern. Based on the …

Resolving security issues in the IoT using blockchain

HAM Malik, AA Shah, AH Muhammad, A Kananah… - Electronics, 2022 - mdpi.com
The Internet of Things is a system of interconnected smart devices that can communicate
with each other and with other devices over the Internet, with or without human-to-human or …

Constrained application protocol for low power embedded networks: A survey

BC Villaverde, D Pesch, RDP Alberola… - … on innovative mobile …, 2012 - ieeexplore.ieee.org
IPv6 will make it possible to provide Internet connectivity to any object embedding a
communication device. In the same line, Web technologies will make managing …