2021
DOI: 10.1088/1742-6596/1850/1/012042
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Security Mechanisms for Resource-Constrained Internet of Things-A Review

Abstract: The Internet of Things (IoT) defined as the assembling of real-world objects that are connected over the Internet to make human lives become well-being. The implementation and success of an IoT depend on how it’s secured. But providing security is a critical task because of various natures of IoT devices such as shared and open environment, a wide range of communication protocols, standards, self-organized, lack of central control, heterogeneity of devices, etc. To provide security solutions and mechanisms, ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Timestamp choices are essential for unidirectional packets, whereas nonce variables safeguard bi-directional transmissions (Lenders et al 2021). Marketing materials only react to recent queries according to nonce, and a 64-bit timestamp eliminates pointless ads and redirection (Prathapchandran et al 2021). Sequential IPv6 packet transmission is ensured by content chaining, and the procedure is authenticated by fragment contents.…”
Section: Intermediate-level Security Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Timestamp choices are essential for unidirectional packets, whereas nonce variables safeguard bi-directional transmissions (Lenders et al 2021). Marketing materials only react to recent queries according to nonce, and a 64-bit timestamp eliminates pointless ads and redirection (Prathapchandran et al 2021). Sequential IPv6 packet transmission is ensured by content chaining, and the procedure is authenticated by fragment contents.…”
Section: Intermediate-level Security Countermeasuresmentioning
confidence: 99%
“…(Ferrara et al 2021) suggests discouraging weak passwords, checking interfaces for vulnerabilities, using HTTPS, and updating software to secure IoT. TLS and SASL authentication and encryption in VIRTUS middleware ensure data integrity and authorized user access (Prathapchandran et al 2021). A semantic framework uses Triple Space Computing to ensure diverse implementation interactions.…”
Section: High-level Security Countermeasuresmentioning
confidence: 99%