Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

A Verma, V Ranga - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …

[HTML][HTML] A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

G Abbas, M Tanveer, ZH Abbas, M Waqas, T Baker… - PloS one, 2021 - journals.plos.org
One of the significant challenges in the Internet of Things (IoT) is the provisioning of
guaranteed security and privacy, considering the fact that IoT devices are resource-limited …

A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems

L Li, G Xu, L Jiao, X Li, H Wang, J Hu… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
With the wide deployment of wireless sensor networks in smart industrial systems, lots of
unauthorized attacking from the adversary are greatly threatening the security and privacy of …

[HTML][HTML] Information-aware secure routing in wireless sensor networks

Q Shi, L Qin, Y Ding, B Xie, J Zheng, L Song - Sensors, 2019 - mdpi.com
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable
to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the …

Secure group mobility support for 6lowpan networks

Y Qiu, M Ma - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The Internet Protocol version 6 (IPv6) over low power wireless personal area networks
(6LoWPANs) has introduced IP technologies to wireless sensor networks, which significantly …

Modeling and analyses of IP spoofing attack in 6LoWPAN network

M Mavani, K Asawa - Computers & Security, 2017 - Elsevier
Abstract 6LoWPAN (modified version of IPv6 for low power devices) inherits security threats
from its predecessor protocols, IPv4 and IPv6. IP spoofing is one such classic attack. There …

Towards securing real time data in IoMT environment

A Palve, H Patel - 2018 8th international conference on …, 2018 - ieeexplore.ieee.org
With the wide use of smart devices, smart phones, sensors and wireless technology, the
Internet of things has changed the perspective of communication and handling of …

DDoS attack aware environment with secure clustering and routing based on RPL protocol operation

BA Alabsi, M Anbar, S Manickam… - IET Circuits, Devices & …, 2019 - Wiley Online Library
Routeing protocol for low‐power and lossy networks (RPL) are widely used in dynamic
wireless sensor network. Several types of researches worked on RPL and designed hybrid …

[PDF][PDF] Ipv6 security issues: A systematic review following prisma guidelines

SA Abdullah, AA Al Ashoor - Baghdad Science Journal, 2022 - iasj.net
Since Internet Protocol version 6 is a new technology, insecure network configurations are
inevitable. The researchers contributed a lot to spreading knowledge about IPv6 …