Understanding security requirements and challenges in Internet of Things (IoT): A review

S Hameed, FI Khan, B Hameed - Journal of Computer Networks …, 2019 - Wiley Online Library
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …

A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things

M Malik, M Dutta, J Granjal - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …

Aggregated-proof based hierarchical authentication scheme for the internet of things

H Ning, H Liu, LT Yang - IEEE Transactions on Parallel and …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an attractive system paradigm to realize
interconnections through the physical, cyber, and social spaces. During the interactions …

Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks

R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …

Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things

S Sahraoui, A Bilami - Computer Networks, 2015 - Elsevier
Abstract The Internet of Things (IoT) is an emerging and promising paradigm that can be
considered as an extension of the Internet to interconnect all kinds of smart objects around …

Security and privacy issues in smart healthcare system using internet of things

R Nidhya, M Kumar, R Maheswar… - IoT‐Enabled Smart …, 2022 - Wiley Online Library
The rapid advancement in Internet of Things (IoT) associated with biosensors provides many
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …

A lightweight IoT security protocol

MT Hammi, E Livolant, P Bellot… - 2017 1st cyber …, 2017 - ieeexplore.ieee.org
The IoT is a technology that enables the inter-connection of smart physical and virtual
objects and provides advanced services. Objects or things are generally constrained …

An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach

A Fayad, B Hammi, R Khatoun - 2018 Third International …, 2018 - ieeexplore.ieee.org
Security of the Internet of Things represents a field that strongly attracts academia and
industry since it represents one of the main obstacles in its adoption. In this area …