Understanding security requirements and challenges in Internet of Things (IoT): A review
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …
power embedded devices that use the Internet to communicate with one another. It is …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …
heterogeneous devices where all kinds of communications seem to be possible, even …
A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
Aggregated-proof based hierarchical authentication scheme for the internet of things
The Internet of Things (IoT) is becoming an attractive system paradigm to realize
interconnections through the physical, cyber, and social spaces. During the interactions …
interconnections through the physical, cyber, and social spaces. During the interactions …
Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks
R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …
technological trend for innovative future applications. Since in IoT systems the devices are …
Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
S Sahraoui, A Bilami - Computer Networks, 2015 - Elsevier
Abstract The Internet of Things (IoT) is an emerging and promising paradigm that can be
considered as an extension of the Internet to interconnect all kinds of smart objects around …
considered as an extension of the Internet to interconnect all kinds of smart objects around …
Security and privacy issues in smart healthcare system using internet of things
The rapid advancement in Internet of Things (IoT) associated with biosensors provides many
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …
A lightweight IoT security protocol
MT Hammi, E Livolant, P Bellot… - 2017 1st cyber …, 2017 - ieeexplore.ieee.org
The IoT is a technology that enables the inter-connection of smart physical and virtual
objects and provides advanced services. Objects or things are generally constrained …
objects and provides advanced services. Objects or things are generally constrained …
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach
Security of the Internet of Things represents a field that strongly attracts academia and
industry since it represents one of the main obstacles in its adoption. In this area …
industry since it represents one of the main obstacles in its adoption. In this area …