Internet of Things (IoT) cybersecurity research: A review of current research topics

Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …

[HTML][HTML] Cybersecurity in power grids: Challenges and opportunities

T Krause, R Ernst, B Klaer, I Hacker, M Henze - Sensors, 2021 - mdpi.com
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ram** commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

Toward a lightweight authentication and authorization framework for smart objects

JL Hernandez-Ramos, MP Pawlowski… - IEEE journal on …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) represents the current technology revolution that is intended to
transform the current environment into a more pervasive and ubiquitous world. In this …

A survey of key bootstrap** protocols based on public key cryptography in the Internet of Things

M Malik, M Dutta, J Granjal - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …

Secure low latency communication for constrained industrial IoT scenarios

J Hiller, M Henze, M Serror, E Wagner… - 2018 IEEE 43rd …, 2018 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) promises value-added services for private and
business applications. However, especially the industrial IoT often faces tough …

Tailoring end-to-end IP security protocols to the Internet of Things

R Hummen, H Wirtz, JH Ziegeldorf… - 2013 21st IEEE …, 2013 - ieeexplore.ieee.org
Recent standardization efforts focus on a number of lightweight IP security protocol variants
for end-to-end security in the Internet of Things (IoT), most notably DTLS, HIP DEX, and …

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading

R Hasan, M Hossain, R Khan - Future Generation Computer Systems, 2018 - Elsevier
The rapid growth of mobile applications requires enhanced computational resources in
order to ensure better performance, security, and usability. In recent years, the proliferation …

Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things

S Sahraoui, A Bilami - Computer Networks, 2015 - Elsevier
Abstract The Internet of Things (IoT) is an emerging and promising paradigm that can be
considered as an extension of the Internet to interconnect all kinds of smart objects around …

LC-DEX: lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based internet of …

B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
The high level of security requirements and low capabilities of constrained devices that are
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …