2020
DOI: 10.1016/j.comcom.2020.02.027
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers

Abstract: The version presented here may differ from the published version or, version of record, if you wish to cite this item you are advised to consult the publisher's version. Please see the 'permanent WRaP URL' above for details on accessing the published version and note that access may require a subscription.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…• Most IoT networks adopt wireless protocols for communications (e.g. WiFi and Sigfox), where malicious actors could obtain confidential data by eavesdropping on the wireless channel [26]. • Most IoT devices are resource-constrained in terms of power, storage, computation, and memory.…”
Section: ) Perception Layermentioning
confidence: 99%
“…• Most IoT networks adopt wireless protocols for communications (e.g. WiFi and Sigfox), where malicious actors could obtain confidential data by eavesdropping on the wireless channel [26]. • Most IoT devices are resource-constrained in terms of power, storage, computation, and memory.…”
Section: ) Perception Layermentioning
confidence: 99%
“…Not all internet apps need to support IPv6, in any case. Gateway has to move the IP address to IPv4 and conversely [44].…”
Section: Communicationsmentioning
confidence: 99%
“…The security methods and protocols designed for IoT is interoperable and co-operative with the existing features of the devices and the service composition of the environment. [10][11][12][13] The existing method [14][15][16][17][18][19][20][21][22][23] provides less security with high computational time, high delay, and high throughput. To overcome these limitations, the communication-aware adaptive key management (CAKM) is proposed for two levels of security at internet of things communication.…”
Section: Introductionmentioning
confidence: 99%
“…The existing method 14‐23 provides less security with high computational time, high delay, and high throughput. To overcome these limitations, the communication‐aware adaptive key management (CAKM) is proposed for two levels of security at internet of things communication.…”
Section: Introductionmentioning
confidence: 99%