31,360 Hits in 5.4 sec

Standards-based end-to-end IP security for the Internet of Things

Rene Hummen, Klaus Wehrle
2013 2013 21st IEEE International Conference on Network Protocols (ICNP)  
Peer authentication and secure data transmission are vital aspects for many scenarios in the IP-based Internet of Things (IoT).  ...  To enable end-to-end security, recent research and standardization efforts focus on a number of IP security protocol variants for the IoT, most notably Datagram TLS (DTLS), the HIP Diet EXchange (DEX),  ...  We believe there is the need to go beyond mere protocol profiling and the use of blunt force to achieve standards-based end-to-end IP security that is suitable for the IoT.  ... 
doi:10.1109/icnp.2013.6733648 dblp:conf/icnp/HummenW13 fatcat:cnnn7g4xmbapdoaefu2uxbnske

Security Challenges in the IP-based Internet of Things

Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle
2011 Wireless personal communications  
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks.  ...  We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.  ...  Conclusions Starting from the lifecycle of a thing in a BAC application, this paper reviewed the architectural design for a secure IP-based Internet of Things and its challenges with special focus on standard  ... 
doi:10.1007/s11277-011-0385-5 fatcat:qgq2ahp7qbhgnb43mlayxgnjty

Protocols for Secure Internet of Things

S Revathi
2017 International Journal of Education and Management Engineering  
It refers to networking of simplest mundane objects not just for human to machine or human to human interactions but for independent thing to thing interaction as well.  ...  The lightweight versions of the existing Internet protocols are backing the operations of IoT to a large extent but the security needs are not met completely as of yet.  ...  The layer by layer security approach provided by TCP/IP forms the base of secure foundation of the Internet.  ... 
doi:10.5815/ijeme.2017.02.03 fatcat:cnfld3m3erbplhw3cfmdjbjp6i

Security Issues and Challenges for the IoT-based Smart Grid

Chakib Bekara
2014 Procedia Computer Science  
, at different levels, to the Internet.  ...  Internet of Things (IoT) is the next step evolution of our today Internet, where any physical object/thing having/equipped with computation and communication capabilities could be seamlessly integrated  ...  What has made Internet universally popular is the use of standard communication protocols, mainly the TCP/IP stack.  ... 
doi:10.1016/j.procs.2014.07.064 fatcat:w6csf4le6rcl7dbotvabvqnywq

Evaluation and recommendations on IPv6 for the Internet of Things

Sebastien Ziegler, Antonio Skarmeta, Peter Kirstein, Latif Ladid
2015 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)  
It aimed at exploiting the potential of IPv6 i and related standards (6LoWPAN ii , COAP iii , 6TiSCH iv , etc.) to overcome current shortcomings and fragmentation of the Internet of Things.  ...  It aimed at exploiting the potential of IPv6 i and related standards (6LoWPAN ii , COAP iii , 6TiSCH iv , etc.) to overcome current shortcomings and fragmentation of the Internet of Things.  ... 
doi:10.1109/wf-iot.2015.7389113 dblp:conf/wf-iot/ZieglerSKL15 fatcat:klow5yvl6jgffnm64rhksnpizq

The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities

Antonio J. Jara, Latif Ladid, Antonio Fernandez Gómez-Skarmeta
2013 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
This work provides an overview of our experiences addressing the challenges in terms of connectivity, reliability, security and mobility of the Internet of Things through IPv6 in order to reach the Internet  ...  Without public IP addresses, the Internet of Things capabilities would be greatly reduced.  ...  The authors would like to thank the European Project "Universal Integration of the Internet of Things through an IPv6-based Service Oriented Architecture enabling heterogeneous components interoperability  ... 
doi:10.22667/jowua.2013.09.31.097 dblp:journals/jowua/JaraLG13 fatcat:fxp3jtjt2jg5jg577d74veahtu

IPv6 Low Power Wireless Personal Area Network (6LoWPAN) for Networking Internet of Things (IoT) – Analyzing its Suitability for IoT

C. Lakshmi Devasena
2016 Indian Journal of Science and Technology  
This paper analyses how 6LoWPAN, a practical developed for resource constrained IP based systems suitable for Internet of Things with respect to Internet Protocol.  ...  The expectation with the Internet of Things is that the increase in number of devices going to be truly dramatic.  ...  Security Mechanisms -Layer 3 (Network Layer) At the layer 3 (Network Layer), the end to end security is provided by the IP. Essentially the entire path between the two endpoints is protected.  ... 
doi:10.17485/ijst/2016/v9i30/98730 fatcat:yvqby7q7ufczxhefgowhb7a4uq

Internet of things communication reference model

Adel H. Alhamedi, Vaclav Snasel, Hamoud M. Aldosari, Ajith Abraham
2014 2014 6th International Conference on Computational Aspects of Social Networks  
It should also be noted that there are efforts in recent years to produce a new reference model for communications to keep pace with the world of Internet for everything.  ...  The model we propose in this paper takes its roots from the OSI (ISO 1984) model, the TCP/IP model (US DoD4 1970), and the Internet model, but it puts its focus on Internet of Things (IoT) specific features  ...  IoT Challenges We try to refer briefly to the most important challenges facing the Internet of Things, which is a source of inspiration to the idea of this paper: Common Standards, Security Issues, and  ... 
doi:10.1109/cason.2014.6920423 dblp:conf/cason/AlhamediSAA14 fatcat:43paedkcprhxtchij6o4iw5rzi

Security of industrial sensor network-based remote substations in the context of the Internet of Things

Cristina Alcaraz, Rodrigo Roman, Pablo Najera, Javier Lopez
2013 Ad hoc networks  
should follow: either completely isolated from the Internet or integrated with it as part of the Internet of Things paradigm.  ...  This paper therefore addresses this question by providing a thorough analysis of both security requirements and infrastructural requirements corresponding to all those TCP/IP integration strategies that  ...  This last one is cofunded by the FEDER Program.  ... 
doi:10.1016/j.adhoc.2012.12.001 fatcat:wawrt6erzfamhipfslpzh65rba

Internet telephony: progress along the road

S. Bradner
2002 IEEE Internet Computing  
Internet Telephony Progress Along the Road I t has been three years since IEEE Internet Computing last dedicated an issue to Internet telephony, and it is interesting to see how much has changed since  ...  then -and somewhat depressing to see how little has changed, as well.  ...  He is a member of the Internet Engineering Steering Group, trustee and secretary of the board for the American Registry for Internet Numbers, vice president for standards for the Internet Society, and  ... 
doi:10.1109/mic.2002.1003129 fatcat:sx6ad6ivkbbjdkdtgafzytfjte

Quality of Service Architecture for Internet of Things and Cloud Computing

Daisy Premila, Albert Rabara, Vimal Jerald
2015 International Journal of Computer Applications  
Hence, in this paper a novel, quality of service architecture for internet of things and cloud computing is proposed.  ...  Internet of Things (IoT) and Cloud Computing paradigm is a next wave in the era of computing and it has been identified as one of the emerging technologies in the field of Computer Science and Information  ...  A Cloud Service for End-User Participation Concerning the Internet of Things, Proceeding of IEEE Conference on Signal-Image Technology and Internet-Based Systems (SITIS), IEEE.  ... 
doi:10.5120/ijca2015906605 fatcat:zogpkbo3qja6ffb4p3zav7lmwu

Efficient End-to-End Secure Key Management Protocol for Internet of Things

Yamina Benslimane, Khelifa BenAhmed
2017 International Journal of Electrical and Computer Engineering (IJECE)  
This vision necessitates the security mechanisms for end-to-end communication.  ...  and required to support standard internet communication with more powerful device or internet hosts.  ...  It consists of two parties, the first part consists of the 6loWPAN host (H), 6loWPAN Routers (R i ), Access Control server (AC) Efficient End-to-End Secure Key Management Protocol for Internet of Things  ... 
doi:10.11591/ijece.v7i6.pp3622-3631 fatcat:wrgvue5finhuxlzbdh22muc7iq

A survey of commercial frameworks for the Internet of Things

Hasan Derhamy, Jens Eliasson, Jerker Delsing, Peter Priller
2015 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA)  
The intention of this paper is to present recent developments in commercial IoT frameworks and furthermore, identify trends in the current design of frameworks for the Internet of Things; enabling massively  ...  The frameworks are evaluated against criteria such as architectural approach, industry support, standards based protocols and interoperability, security, hardware requirements, governance and support for  ...  ACKNOWLEDGEMENTS The Authors would like to thank AVL List GMBH for supporting this survey of commercial frameworks for the Internet of Things.  ... 
doi:10.1109/etfa.2015.7301661 dblp:conf/etfa/DerhamyEDP15 fatcat:esaatq44sjaklmzrccrfeq5fza

Internet of Threats and Context Aware Security: Part One

Junaid Chaudhry, Ahmed Ibrahim, Ali Kashif Bashir
2017 IEEE Technology Policy and Ethics  
Internet of Things" (IoT): The assignment of Internet Protocol (IP) addresses to a plethora of devices, which lets them perform mundane tasks has left information security engineers with extensive grounds  ...  The volume of investment is estimated to be more than 1.7 trillion dollars by 2019 among end users, and 3.7 billion dollars among investors [8].  ...  Salmon Cinotti, A Semantic Publish-Subscribe Architecture for the Internet of Things, IEEE Internet of Things Journal, Col. 3 No. 6, Dec 2016  ... 
doi:10.1109/ntpe.2017.9778104 fatcat:4n6rv5egmbfbxjay7ih5gezfoy

Challenges and Solutions for Internet of Things Driven by IPv6

2015 KSII Transactions on Internet and Information Systems  
Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses.  ...  In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication.  ...  all the benefits of IP, such as scalability and end to end connectivity.  ... 
doi:10.3837/tiis.2015.12.001 fatcat:lib77pei2zbwrf2gz3xfge2w4y
« Previous Showing results 1 — 15 out of 31,360 results