2018 IEEE International Conference on Consumer Electronics (ICCE) 2018
DOI: 10.1109/icce.2018.8326099
|View full text |Cite
|
Sign up to set email alerts
|

A security evaluation of popular Internet of Things protocols for manufacturers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…The work in [90] focuses on the ZigBee, Z-wave, and BLE protocols, and details on their security aspects and deficiencies as depicted by the relevant literature. In the same year, the authors of [91] elaborated on the security features of Z-Wave and Thread protocols in an effort to identify present and future security challenges.…”
Section: Group IImentioning
confidence: 99%
“…The work in [90] focuses on the ZigBee, Z-wave, and BLE protocols, and details on their security aspects and deficiencies as depicted by the relevant literature. In the same year, the authors of [91] elaborated on the security features of Z-Wave and Thread protocols in an effort to identify present and future security challenges.…”
Section: Group IImentioning
confidence: 99%
“…One may cite for example Dinu and Kizhvatov [13] on Thread and Rouch et al [14] regarding Z-Wave. The consensus on these protocols is that security is acceptable in most cases [15] because most security breaches are coming from implementation issues.…”
Section: Related Workmentioning
confidence: 99%
“…Connecting a large number of devices to the Internet and allowing them to actively engage in the network, IoT allows machine-to-machine communication over the Internet [2]. In 2017, there were roughly 27 billion IoT devices, and by 2020, this number is anticipated to reach 50 billion [3]. There are a lot of security issues with IoT settings since they are generally made up of a lot of heterogeneous and low-cost devices that have little or no security built-in [4].…”
Section: Introductionmentioning
confidence: 99%