2015
DOI: 10.1016/j.comnet.2015.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(22 citation statements)
references
References 18 publications
0
21
0
1
Order By: Relevance
“…These methods focus mainly to enhance the security of IP based lightweight protocols basically designed as adaptations of the traditional TCP/IP protocols in the Internet of Things. DTLS 9 (Datagram Transport Layer Security), 6LoWPAN 10 (IPv6 Low power Wireless Personal Area Networks), RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks)) are just examples among other protocols widely adopted in the world of IoT which provide confidentiality and integrity of end-to-end exchanged information between IoT devices [107]. However, these protocols are not initially designed to deal with the most common IP based DoS/DDoS attacks.…”
Section: Iot Dos/ddos Countermeasure Approachesmentioning
confidence: 99%
“…These methods focus mainly to enhance the security of IP based lightweight protocols basically designed as adaptations of the traditional TCP/IP protocols in the Internet of Things. DTLS 9 (Datagram Transport Layer Security), 6LoWPAN 10 (IPv6 Low power Wireless Personal Area Networks), RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks)) are just examples among other protocols widely adopted in the world of IoT which provide confidentiality and integrity of end-to-end exchanged information between IoT devices [107]. However, these protocols are not initially designed to deal with the most common IP based DoS/DDoS attacks.…”
Section: Iot Dos/ddos Countermeasure Approachesmentioning
confidence: 99%
“…Security concerns: IoT-specific security threats result from the proliferation of embedded and connected devices and underlying network heterogeneity [59,79]. Security attacks include, for example, identity fabrication, unauthorized access to intellectual property, sabotage of critical infrastructure, and denial of service [31].…”
mentioning
confidence: 99%
“…Thus they provide a brief overview of all the security challenges faced by the IoT effectively. Sahraoui and Bilami [24] propose a 6LoWPAN compression for the header of HIP packets. They also suggest an adaptive distribution security computational load system in HIP -BEX.…”
Section: Literature Surveymentioning
confidence: 99%