2017
DOI: 10.5815/ijeme.2017.02.03
|View full text |Cite
|
Sign up to set email alerts
|

Protocols for Secure Internet of Things

Abstract: Internet of Things has become a buzzword. It refers to networking of simplest mundane objects not just for human to machine or human to human interactions but for independent thing to thing interaction as well. Such interconnected or smart environment can do wonders but at the same time poses numerous threats to human lives. The ordinary and less powerful objects from day to day life are holding sensitive and private data from humans and trying to transport that through the insecure world of Internet. This new… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 9 publications
(11 reference statements)
0
1
0
Order By: Relevance
“…Due to the nature of this network, it is complicated to adapt existing infrastructures and protocols with the new features. These restrictions must be considered while designing IoT solutions and security protocols [18,19] The first authentication version of [11] is based on four exchanges of association and authentication messages. The protocol switches from a traditional authentication based on exchanging messages between the Device and the Gateway (ID and password) to a new protocol that includes another message based on a two-entry Fotp function.…”
Section: Iot Security Featuresmentioning
confidence: 99%
“…Due to the nature of this network, it is complicated to adapt existing infrastructures and protocols with the new features. These restrictions must be considered while designing IoT solutions and security protocols [18,19] The first authentication version of [11] is based on four exchanges of association and authentication messages. The protocol switches from a traditional authentication based on exchanging messages between the Device and the Gateway (ID and password) to a new protocol that includes another message based on a two-entry Fotp function.…”
Section: Iot Security Featuresmentioning
confidence: 99%