2022
DOI: 10.3390/electronics11111762
|View full text |Cite
|
Sign up to set email alerts
|

On Wide-Area IoT Networks, Lightweight Security and Their Applications—A Practical Review

Abstract: The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze collected data over the Internet. IoT devices are located in diverse environments and support many applications. To protect IoT systems from cyber threats, Confidentiality, Integrity, and Authentication—the CIA triad—must be supported. However, IoT devices have limited energy and computational resources. Lightweight encryption algorithms have been proposed for IoT, and have been reviewed by previous studies. Some cov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 91 publications
(188 reference statements)
0
7
0
Order By: Relevance
“…Presenting an environment based on hardware, software and SDR to study the radio layer of the protocol Goulart et al [71] Application of the CIA triad Classify lightweight security approaches for AES and ECC [76] Novel secure root key updating scheme that involves periodically changing the root key value based on the CTR_AES DRBG 128 algorithm…”
Section: Claverie Et Al [70] -mentioning
confidence: 99%
“…Presenting an environment based on hardware, software and SDR to study the radio layer of the protocol Goulart et al [71] Application of the CIA triad Classify lightweight security approaches for AES and ECC [76] Novel secure root key updating scheme that involves periodically changing the root key value based on the CTR_AES DRBG 128 algorithm…”
Section: Claverie Et Al [70] -mentioning
confidence: 99%
“…Security: Network data, particularly that of wireless networks, is vulnerable to a wide range of attacks, including denial of service, spoofing, eavesdropping, and so on [25]. In an attempt to counteract these assaults, IoT systems include security features, such as content integrity, message integrity, privacy, authorization, and authentication [26].…”
Section: The Iot Functional Building Elementsmentioning
confidence: 99%
“…In order to obtain a user's password in plain text, an attacker may act as a "man in the middle" by intercepting the connection between the user's browser and the end server. While best safety practices indicate that all traffic between clients and servers should be secured by encryption such as HTTPS, a large number of online sites still use unencrypted traffic over HTTP [25,26]. If an attacker is able to intercept requests by the user in plain text, there is no need to brute force the password.…”
Section: Man In the Middlementioning
confidence: 99%