Rizzardi et al., 2022 - Google Patents
Analysis on functionalities and security features of Internet of Things related protocolsRizzardi et al., 2022
View HTML- Document ID
- 5851609952261862503
- Author
- Rizzardi A
- Sicari S
- Coen-Porisini A
- Publication year
- Publication venue
- Wireless Networks
External Links
Snippet
Abstract The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the …
- 238000004458 analytical method 0 title description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Park et al. | Security architecture and protocols for secure MQTT-SN | |
US11240212B2 (en) | Content security at service layer | |
US10601594B2 (en) | End-to-end service layer authentication | |
Ni et al. | Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT | |
Malik et al. | A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things | |
Rizzardi et al. | Analysis on functionalities and security features of Internet of Things related protocols | |
Tschofenig et al. | Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things | |
Granjal et al. | Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey | |
Mahalle et al. | Identity authentication and capability based access control (iacac) for the internet of things | |
Hernandez-Ramos et al. | Toward a lightweight authentication and authorization framework for smart objects | |
US8254581B2 (en) | Lightweight key distribution and management method for sensor networks | |
Bhattacharjya et al. | Security challenges and concerns of Internet of Things (IoT) | |
JP7551080B2 (en) | Method and architecture for securing and managing a network of embedded systems with an optimized public key infrastructure - Patents.com | |
Chellappan et al. | Security and privacy in the Internet of Things | |
Fossati | RFC 7925: Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things | |
Benslimane et al. | Efficient end-to-end secure key management protocol for internet of things | |
Schmitt et al. | Two-way authentication for the internet-of-things | |
Thungon et al. | A survey on 6LoWPAN security for IoT: Taxonomy, architecture, and future directions | |
Hossain | Towards a holistic framework for secure, privacy-aware, and trustworthy internet of things using resource-efficient cryptographic schemes | |
Patonico et al. | Toward the inclusion of end-to-end security in the OM2M platform | |
Hu | Layered network protocols for secure communications in the Internet of Things | |
Gao et al. | SecT: A lightweight secure thing-centered IoT communication system | |
Wang et al. | An efficient EAP-based pre-authentication for inter-WRAN handover in TV white space | |
Mohamed et al. | Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis | |
Satpathy et al. | A sustainable mutual authentication protocol for IoT-Fog-Cloud environment |