2014 International Conference on Next Generation Networks and Services (NGNS) 2014
DOI: 10.1109/ngns.2014.6990267
|View full text |Cite
|
Sign up to set email alerts
|

Compressed and distributed host identity protocol for end-to-end security in the IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 10 publications
0
13
0
1
Order By: Relevance
“…Different recent researches find that deployment of IoT systems will encounter various challenges and serious security matters. Nevertheless, they state that if IOT construction copes adequately through integrating appropriate information and communication technologies into the IoT environment, these challenges can be mitigated and restricted effectively (Sahraoui & Bilami, 2014;Nardelli et al, 2017). Several reasons lead most businesses and worldwide organizations to board around this technology, as illustrated in Figure 4.…”
Section: Reasons For Adapting Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Different recent researches find that deployment of IoT systems will encounter various challenges and serious security matters. Nevertheless, they state that if IOT construction copes adequately through integrating appropriate information and communication technologies into the IoT environment, these challenges can be mitigated and restricted effectively (Sahraoui & Bilami, 2014;Nardelli et al, 2017). Several reasons lead most businesses and worldwide organizations to board around this technology, as illustrated in Figure 4.…”
Section: Reasons For Adapting Iotmentioning
confidence: 99%
“…Several reasons lead most businesses and worldwide organizations to board around this technology, as illustrated in Figure 4. According to the chart, the following chart demonstrates the major motives for adopting IoT in a business environment and, according to the chart, improving, enhancing service qualities or products from the highest reason for the utilization of IoT, which take like 47% of their priority (Sahraoui & Bilami, 2014;Nardelli et al, 2017). It can see that the second significant motive for implementation of IoT in a majority of businesses is to improve the productivity of industries as well as maximize the reliability of operations which form respectively as 45%, 44% of their goals (Sahraoui & Bilami, 2014;Nardelli et al, 2017).…”
Section: Reasons For Adapting Iotmentioning
confidence: 99%
“…In order to improve the extensibility and to minimize the operation and irregularity in the packet on the IoT components, one of the inner parts of the overlay nodes maintains the blockchain. Clustering algorithms will be used to form the clusters among the nodes [32,33].…”
Section: Proposed Simple Size Extensible (Sse) Blockchainmentioning
confidence: 99%
“…Em [Sahraoui and Bilami 2014], os autores propõem uma nova forma de autenticação e controle de acesso para tornar dispositivos IoT seguros contra acesso não autorizado. O método proposto baseia-se em duas autoridades de autenticação: Autoridade de Registo (do inglês, Registration Authority -RA) e Autoridade de Registro Residencial (do inglês, Home Registration Authority -HRA, ).…”
Section: Trabalhos Relacionadosunclassified