pTASC: trustable autonomous secure communications
The number of devices connected to the Internet has been increasing exponentially. There
is a substantial amount of data being exchanged among numerous connected devices. The …
is a substantial amount of data being exchanged among numerous connected devices. The …
Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications
The emergence of social networking and proximity services is driving the Internet-ofThings
(IoT) paradigms toward a location-aware connecting society. To prepare for such a booming …
(IoT) paradigms toward a location-aware connecting society. To prepare for such a booming …
[PDF][PDF] Leveraging Public-key-based Authentication for the Internet of Things
H Shafagh - RWTH AACHEN University, Germany, Jul, 2013 - Citeseer
The vision of the IP-based Internet of Things (IoT) anticipates the interconnection of
constrained devices in the physical world with the Internet. Specifically, the IoT aims at …
constrained devices in the physical world with the Internet. Specifically, the IoT aims at …
A Peer to Peer Security Protocol for the Internet of Things: Secure Communication for the SensibleThings Platform
H Zhang - 2014 - diva-portal.org
With the rapid development of the Internet connected technologies and applications, people
are keen on embracing the convenience and practi-‐‑calities they brings. As all kinds of …
are keen on embracing the convenience and practi-‐‑calities they brings. As all kinds of …
Short Paper:'A peer to peer security protocol for the internet of things': Secure communication for the sensiblethings platform
H Zhang, T Zhang - 2015 18th International Conference on …, 2015 - ieeexplore.ieee.org
Nowadays, the Internet of Things is able to provide more advanced services to people,
which connects a variety of devices, systems and applications. However, it covers a variety …
which connects a variety of devices, systems and applications. However, it covers a variety …
A certificate-based pairwise key establishment protocol for IoT resource-constrained devices
In this paper, we address the problem of security in communication between IoT resource-
constrained devices. We propose a peer-to-peer key establishment protocol based on …
constrained devices. We propose a peer-to-peer key establishment protocol based on …
SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network
The emergence of the internet of Things (IoT) has resulted in the possession of a
continuously increasing number of highly heterogeneous connected devices by the same …
continuously increasing number of highly heterogeneous connected devices by the same …
[PDF][PDF] Cross layer techniques to secure peer-to-peer protocols for location, adjacency, and identity verification
AK Saha - 2006 - Citeseer
Ubiquitous computing, context aware computing, and augmented reality are related by a
desire to merge the physical world with the virtual world of electronic services and …
desire to merge the physical world with the virtual world of electronic services and …
Privacy, discovery, and authentication for the internet of things
Automatic service discovery is essential to realizing the full potential of the Internet of Things
(IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low …
(IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low …
Keeping connected in internet-isolated locations
KL Skaug, EB Smebye, B Tola… - … Conference On Mobile …, 2022 - ieeexplore.ieee.org
In many scenarios, Internet connectivity may not be available. In such situations, device-to-
device (D2D) communication may be utilized to establish a peer-to-peer (P2P) network …
device (D2D) communication may be utilized to establish a peer-to-peer (P2P) network …