2016 International Conference on Applied and Theoretical Electricity (ICATE) 2016
DOI: 10.1109/icate.2016.7754665
|View full text |Cite
|
Sign up to set email alerts
|

A security analysis on standard IoT protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(12 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…6LoWPAN has been utilized in medical care and patient monitoring. Devices using 6LoWPAN can save lives by monitoring the state of a patient to keep track of their health, and react with alarms that can trigger other medical devices in cases where more urgent intervention is required [ 122 ], [ 123 ]. 6LoWPAN sends and receives packets over networks.…”
Section: Most Relevant Protocols For Medical Iotmentioning
confidence: 99%
“…6LoWPAN has been utilized in medical care and patient monitoring. Devices using 6LoWPAN can save lives by monitoring the state of a patient to keep track of their health, and react with alarms that can trigger other medical devices in cases where more urgent intervention is required [ 122 ], [ 123 ]. 6LoWPAN sends and receives packets over networks.…”
Section: Most Relevant Protocols For Medical Iotmentioning
confidence: 99%
“…The authors of [ 104 , 105 ] presented a security analysis between MQTT and CoAP with a specific focus on the transport protocol utilised MQTT with TLS and CoAP with DTLS. Furthermore, the comparative examination took into account security modes such as Raw Public Key, Certificates and Pre-Shared Key.…”
Section: Security Solutions For Iot and Industrial Systemsmentioning
confidence: 99%
“…The first survey provides an extensive analysis of IoT security protocols and mechanisms in addition to open research issues and challenges faced in this field [3]. Security challenges faced by industries offering IoT platforms are discussed in [64]. The discussion includes challenges in using the protocols discussed in the paper.…”
Section: Other Work Done On Iot Securitymentioning
confidence: 99%
“…Surveys of standardized and non-standardized IoT protocols are presented in [3,64,65]. The first survey provides an extensive analysis of IoT security protocols and mechanisms in addition to open research issues and challenges faced in this field [3].…”
Section: Other Work Done On Iot Securitymentioning
confidence: 99%