Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next wave of innovation that promises to improve and
optimize our daily life based on intelligent sensors and smart objects working together …

Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …

Security Challenges in the IP-based Internet of Things

T Heer, O Garcia-Morchon, R Hummen… - Wireless Personal …, 2011 - Springer
A direct interpretation of the term Internet of Things refers to the use of standard Internet
protocols for the human-to-thing or thing-to-thing communication in embedded networks …

[图书][B] The 3G IP multimedia subsystem (IMS): merging the Internet and the cellular worlds

G Camarillo, MA Garcia-Martin - 2011 - books.google.com
Third edition of this best-selling guide to IMS: fully revised, and updated with brand new
material The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with …

The parrot is dead: Observing unobservable network communications

A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …

[HTML][HTML] Ip security (ipsec) and internet key exchange (ike) document roadmap

S Frankel, S Krishnan - 2011 - rfc-editor.org
RFC 6071: IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Internet Engineering …

Lawful interception of end-to-end encrypted data traffic

I Uusitalo, P Ahonen, R Blom, B Krister… - US Patent …, 2008 - Google Patents
(57) ABSTRACT A method of facilitating the lawful interception of an IP session between two
or more terminals 12.13, wherein session uses encryption to secure traffic. The method …

[HTML][HTML] FLUTE-file delivery over unidirectional transport

T Paila, R Walsh, M Luby, V Roca, R Lehtonen - 2012 - rfc-editor.org
RFC 6726: FLUTE - File Delivery over Unidirectional Transport [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata Exist Internet Engineering …

[HTML][HTML] Extensible authentication protocol (EAP) key management framework

B Aboba, D Simon, P Eronen - 2008 - rfc-editor.org
RFC 5247: Extensible Authentication Protocol (EAP) Key Management Framework [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Updated …

Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications

P Porambage, A Braeken, C Schmitt, A Gurtov… - IEEE …, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are a prominent fundamental technology of the Internet of
Things (IoTs). Rather than device-to-device communications, group communications in the …