2011
DOI: 10.1007/s11277-011-0385-5
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges in the IP-based Internet of Things

Abstract: Abstract. A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
131
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 326 publications
(136 citation statements)
references
References 17 publications
0
131
0
1
Order By: Relevance
“…Indeed, a user or entity can prove a specific set of properties associated with a subset of identity attributes, without disclosing the content of such attributes itself. Even though some important initiatives, such as PrimeLife (http://primelife.ercim.eu/) or ABC4Trust [22] have analyzed the use of ACS-based and privacy-preserving identity management systems, the IoT paradigm demands adapted solutions to ensure a seamless development of an IP-based approach [23]. Unlike in current Internet scenarios, common IoT use cases are based on a huge amount of heterogeneous smart objects interacting, and consequently, communications protocols and implementation need to be adapted.…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, a user or entity can prove a specific set of properties associated with a subset of identity attributes, without disclosing the content of such attributes itself. Even though some important initiatives, such as PrimeLife (http://primelife.ercim.eu/) or ABC4Trust [22] have analyzed the use of ACS-based and privacy-preserving identity management systems, the IoT paradigm demands adapted solutions to ensure a seamless development of an IP-based approach [23]. Unlike in current Internet scenarios, common IoT use cases are based on a huge amount of heterogeneous smart objects interacting, and consequently, communications protocols and implementation need to be adapted.…”
Section: Related Workmentioning
confidence: 99%
“…Raymond et al [40], discusses currently used protection methods against DoS in Wireless Sensor Networks. Moreover, Garcia et al [13,14] present various DoS countermeasures such as: DTLS, IKEv2, HIP, and Diet HIP, for IP-based Internet of Things. Finally [19] proposes a DoS detection architecture for 6LoWPAN network with great potential.…”
Section: Disruption Of Service (Dos/ddos)mentioning
confidence: 99%
“…A number of research projects (for example IETF SOLACE, BUTLER) have already tried to address different security aspects of IIoT and several relevant publications can also be found in the literature [14,15,16,17].…”
Section: Industrial Internet Of Thingsmentioning
confidence: 99%