RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects

HC Pöhls, V Angelakis, S Suppan… - 2014 IEEE wireless …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) provides a platform for the interconnection of a plethora of smart
objects. It has been widely accepted for providing Information and Communication …

iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy

P Li, J Su, X Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Enabling end-to-end secure communication is essential for many Internet-of-Things (IoT)
application scenarios. Transport-layer security (TLS) and datagram TLS (DTLS) are the de …

A critical review on secure authentication in wireless network

M Diwakar, P Singh, P Kumar, K Tiwari… - … Learning, Advances in …, 2022 - Springer
Wireless network connectivity is capable of addressing various mobility issues and helps
users of smartphones to navigate around and remain connected to the network without …

Enabling end-to-end secure communication between wireless sensor networks and the Internet

H Yu, J He, T Zhang, P Xiao, Y Zhang - World Wide Web, 2013 - Springer
In the paradigms of the Internet of Things (IoT) as well as the evolving Web of Things (WoT)
and the emerging Wisdom Web of Things (W2T), not only can the data collected by the …

Handover Authenticated Key Exchange for Multi-access Edge Computing

Y Xia, J Zhang, KL Man, Y Dong - Journal of Network and Computer …, 2025 - Elsevier
Abstract Authenticated Key Exchange (AKE) has been playing a significant role in ensuring
communication security. However, in some Multi-access Edge Computing (MEC) scenarios …

Communication security and privacy support in 6LoWPAN

X Wang, Y Mu - Journal of Information Security and Applications, 2017 - Elsevier
As an emerging technology, 6LoWPAN can be reachable at any location and at any time via
the internet, so it usually suffers from the threats such as disclosure of information …

Energy and processing demand analysis of tls protocol in internet of things applications

AH Gerez, K Kamaraj, R Nofal, Y Liu… - … Workshop on Signal …, 2018 - ieeexplore.ieee.org
Transport Layer Security (TLS) is the de-facto protocol for secure communication in Internet
of Things (IoT) applications. However, the processing and energy demands of this protocol …

Itls/idtls: Lightweight end-to-end security protocol for iot through minimal latency

P Li, J Su, X Wang - Proceedings of the ACM SIGCOMM 2019 …, 2019 - dl.acm.org
Transport Layer Security (TLS) and Datagram TLS (DTLS) are the de-facto protocols of
Internet of Things (IoT) for end-to-end secure communication. However, typical deployment …

Cryptographic key exchange in IPv6-based low power, lossy networks

P Ilia, G Oikonomou, T Tryfonas - … Security Theory and Practice. Security of …, 2013 - Springer
Abstract The IEEE 802.15. 4 standard for low-power radio communications defines
techniques for the encryption of layer 2 network frames but does not discuss methods for the …

A group key distribution scheme for wireless sensor networks in the internet of things scenario

H Yu, J He, T Zhang, P Xiao - International Journal of …, 2012 - journals.sagepub.com
As an indispensable part of the Internet of Things (IoT), wireless sensor networks (WSNs)
need to be completely integrated into the Internet. When an Internet user communicates with …