Security for internet of things: A state of the art on existing protocols and open research issues

C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
Internet of Things (IoT) consists of devices, smart objects, and people that are given a
unique identifier connected to the internet via wireless network. These devices are usually …

ICMPv6-based DoS and DDoS attacks and defense mechanisms

OE Elejla, M Anbar, B Belaton - IETE Technical Review, 2017 - Taylor & Francis
The number of internet users and devices that are in need for more IP addresses to be
assigned to them is rapidly increasing. A new protocol named IPv6 was developed in 1998 …

A privacy and session key based authentication scheme for medical IoT networks

P Kumar, L Chouhan - Computer Communications, 2021 - Elsevier
Due to rapid increase rate of smart medical devices, the existing security internet of things
(IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the …

System and method for enabling unconfigured devices to join an autonomic network in a secure manner

S Bjarnason, MH Behringer, YFE Hertoghs… - US Patent …, 2015 - Google Patents
(57) ABSTRACT A method in an example embodiment includes creating an initial
information package for a device in a domain of a network environment when the device is …

Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey

J Granjal, E Monteiro, JS Silva - Ad Hoc Networks, 2015 - Elsevier
The integration of low-power wireless sensing and actuating devices with the Internet will
provide an important contribution to the formation of a global communications architecture …

TARP: Ticket-based address resolution protocol

W Lootah, W Enck, P McDaniel - Computer networks, 2007 - Elsevier
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper
operation. Unfortunately, vulnerabilities in ARP enable a raft of Internet Protocol (IP)-based …

IPv6 security challenges

CE Caicedo, JBD Joshi, SR Tuladhar - Computer, 2009 - ieeexplore.ieee.org
IPv6 Security Challenges Page 1 IPv6, the new version of the Internet Protocol, has been
developed to provide new services and to support the Internet’s growth. An overview of the key …

IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey

ASAMS Ahmed, R Hassan, NE Othman - IEEE access, 2017 - ieeexplore.ieee.org
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6)
suite. The motive behind NDP is to replace address resolution protocol (ARP), router …

Computer Networking: Principles, Protocols and Practice

O Bonaventure - 2011 - dlib.hust.edu.vn
ment. Today, there are high-quality and widely used open-source implementations for most
networking protocols. This includes the TCP/IP implementations that are part of linux …

Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network

AK Al-Ani, M Anbar, A Al-Ani, DR Ibrahim - IEEE Access, 2020 - ieeexplore.ieee.org
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …