Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application

PM Kumar, UD Gandhi - The Journal of Supercomputing, 2020 - Springer
As health data are very sensitive, there is a need to prevent and control the health data with
end-to-end security solutions. In general, a number of authentication and authorization …

A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions

LC Thungon, N Ahmed, D De, MI Hussain - Wireless Personal …, 2024 - Springer
Provisioning security to the communications, data, and partaking things in resource-
constrained IoT is a huge challenge. Due to the scalability and interoperability among low …

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things

S Raza, T Helgason, P Papadimitratos… - Future Generation …, 2017 - Elsevier
Abstract Constrained Application Protocol (CoAP) has become the de-facto web standard for
the IoT. Unlike traditional wireless sensor networks, Internet-connected smart thing …

A taxonomy for the security assessment of ip-based building automation systems: The case of thread

Y Liu, Z Pang, G Dán, D Lan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Motivated by the proliferation of wireless building automation systems (BAS) and increasing
security-awareness among BAS operators, in this paper, we propose a taxonomy for the …

Dos attacks analysis and improvement in dtls protocol for internet of things

Y Maleh, A Ezzati, M Belaissaoui - … on Big Data and Advanced Wireless …, 2016 - dl.acm.org
The main contribution in this paper is to improve the weakness of cookies exchange in the
handshake process in order to counter DoS attacks. The enhanced protocol is performed on …

Flexible and efficient security framework for many-to-many communication in a publish/subscribe architecture

R Van Glabbeek, D Deac, T Perale, K Steenhaut… - Sensors, 2022 - mdpi.com
Message Queuing Telemetry Transport (MQTT) is a lightweight publish/subscribe protocol,
which is currently one of the most popular application protocols in Internet of Things (IoT) …

A survey on DDoS attacks on network and application layer in IoT

N Pandey, PK Mishra - … on Advanced Network Technologies and Intelligent …, 2021 - Springer
IoT makes the devices remotely accessible and these devices are used to collect data for
analysis at a later stage. IoT was expected to bring revolutionary changes in the way people …

DTLS based secure group communication scheme for Internet of Things

B Choudhury, A Nag, S Nandi - … on Mobile Ad Hoc and Sensor …, 2020 - ieeexplore.ieee.org
Multicast communication in IoT is prevalent in many applications like smart lighting, firmware
update etc. In such applications a single multicast message is sent to all the group members …

Compression method for IPSec over 6LowPAN

H Wang, Z Sun - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
This paper focuses on a header compression method for the Authentication Header (AH)
and Encapsulation Security Payload (ESP) for application to 6LoWPAN. Based on the …

Design and Implementation of Distributed Identity and Access Management Framework for Internet of Things (IoT) Enabled Distribution Automation

AT Bitebo, H Maziku, H Ndyetabura, CN Tarimo… - Tanzania Journal of …, 2022 - ajol.info
The smart grid and Internet of Things (IoT) technologies play vital roles in improving the
quality of services offered in traditional electrical grid. They open a room for the introduction …