pTASC: trustable autonomous secure communications

PR Sousa, A Cirne, JS Resende, R Martins… - Proceedings of the 20th …, 2019 - dl.acm.org
The number of devices connected to the Internet has been increasing exponentially. There
is a substantial amount of data being exchanged among numerous connected devices. The …

Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications

NN Dao, Y Kim, S Jeong, M Park, S Cho - IEEE Access, 2017 - ieeexplore.ieee.org
The emergence of social networking and proximity services is driving the Internet-ofThings
(IoT) paradigms toward a location-aware connecting society. To prepare for such a booming …

[PDF][PDF] Leveraging Public-key-based Authentication for the Internet of Things

H Shafagh - RWTH AACHEN University, Germany, Jul, 2013 - Citeseer
The vision of the IP-based Internet of Things (IoT) anticipates the interconnection of
constrained devices in the physical world with the Internet. Specifically, the IoT aims at …

A Peer to Peer Security Protocol for the Internet of Things: Secure Communication for the SensibleThings Platform

H Zhang - 2014 - diva-portal.org
With the rapid development of the Internet connected technologies and applications, people
are keen on embracing the convenience and practi-‐‑calities they brings. As all kinds of …

Short Paper:'A peer to peer security protocol for the internet of things': Secure communication for the sensiblethings platform

H Zhang, T Zhang - 2015 18th International Conference on …, 2015 - ieeexplore.ieee.org
Nowadays, the Internet of Things is able to provide more advanced services to people,
which connects a variety of devices, systems and applications. However, it covers a variety …

A certificate-based pairwise key establishment protocol for IoT resource-constrained devices

M Djam-Doudou, AAA Ari, JHM Emati, AN Njoya… - Pan-African Artificial …, 2022 - Springer
In this paper, we address the problem of security in communication between IoT resource-
constrained devices. We propose a peer-to-peer key establishment protocol based on …

SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network

A Aktypi, K Kalkan, KB Rasmussen - … of the Tenth ACM Conference on …, 2020 - dl.acm.org
The emergence of the internet of Things (IoT) has resulted in the possession of a
continuously increasing number of highly heterogeneous connected devices by the same …

[PDF][PDF] Cross layer techniques to secure peer-to-peer protocols for location, adjacency, and identity verification

AK Saha - 2006 - Citeseer
Ubiquitous computing, context aware computing, and augmented reality are related by a
desire to merge the physical world with the virtual world of electronic services and …

Privacy, discovery, and authentication for the internet of things

DJ Wu, A Taly, A Shankar, D Boneh - … 26-30, 2016, Proceedings, Part II 21, 2016 - Springer
Automatic service discovery is essential to realizing the full potential of the Internet of Things
(IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low …

Keeping connected in internet-isolated locations

KL Skaug, EB Smebye, B Tola… - … Conference On Mobile …, 2022 - ieeexplore.ieee.org
In many scenarios, Internet connectivity may not be available. In such situations, device-to-
device (D2D) communication may be utilized to establish a peer-to-peer (P2P) network …