LiFi/WiFi authentication and handover protocols: Survey, evaluation, and recommendation

IIMA Sulayman, R He, M Manka… - 2021 International …, 2021 - ieeexplore.ieee.org
Current WiFi technology is not sufficient to meet the exponentially increasing demands for
data bandwidth brought by the fast expansion of mobile communication and IoT services …

Introducing TLS/DTLS secure access modules for IoT frameworks: concepts and experiments

P Urien - 2017 IEEE symposium on computers and …, 2017 - ieeexplore.ieee.org
This paper introduces security modules for IoT frameworks. Many IoT legacy infrastructures
use the TLS/DTLS protocols for communication security. Security modules are tamper …

Hacking smart parking meters

NV Juliadotter - 2016 International Conference on Internet of …, 2016 - ieeexplore.ieee.org
The world around us is increasingly connected through the Internet of Things (IoT) using
wireless technologies such as Low-Rate Wireless Personal Area Networks (LR-WPANs) …

An enhanced Trust Center based authentication in ZigBee networks

K Lee, J Lee, B Zhang, J Kim, Y Shin - … , ISA 2009, Seoul, Korea, June 25 …, 2009 - Springer
Abstract The The ZigBee is a type of LR-WPAN technology that as low data rate, low power
consumption, low cost, wireless networking protocol targeted towards automation and …

Security in IEEE 802.15. 4 cluster based networks

M Khan, J Misic - Wireless Networks and Mobile …, 2008 - api.taylorfrancis.com
The recently adopted IEEE 802.15. 4 standard is poised to become the key enabler for low
complexity, ultra-low power consumption, low data rate wireless connectivity among …

이웃탐지와ACL 을이용한ZigBee 기반의홈네트워크보안시스템구현

박현문, 박수현, 서해문 - 전자공학회논문지-CI, 2009 - dbpia.co.kr
홈네트워크 (Home Network) 와 같이 개방된 환경에서 여러 개의 아토셀 (Ato-cell) 로 구성된
ZigBee 클러스터는 측정 및 수집 정보의 전달에 대한 안전한 보안이 요구된다. 또한 ZigBee …

[PDF][PDF] Simulation and evaluation of security and intrusion detection in IEEE 802.15. 4 network

F Amini - 2008 - mspace.lib.umanitoba.ca
With the fäst growth of wireless sensor technology, the idea of using Wireless Sen-sor
Networks (WSNs) in more critical applications of real life is becoming popular. WSNs are …

Method and system for establishing security connection between switch equipments

Q Li, J Cao, L Ge, M Tie, Z Huang - US Patent 8,713,303, 2014 - Google Patents
A method and a system for establishing a security connection between switch equipments
are disclosed in the present invention. The system includes the first switch equipment and …

[PDF][PDF] Development of Authentication and Security Procedures for IoT System

MAJ Chinchawade - National Conference “AECD, 2018 - researchgate.net
Security and privacy in Internet of Things (IoT) is a major challenge, mainly due to the
massive scale and distributed nature of IoT networks. Block chain-based approaches …

[PDF][PDF] Research on A-key distribution algorithms for protecting data of RS-485-based industrial infrastructure

J Song, S Jung, S Kim - WSEAS Transactions on Computers, 2010 - wseas.us
The RS-485 protocol is a Modbus serial communication, mainly used by SCADA
(Supervisory Control And Data Acquisition). Most industrial infrastructure using this …