Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

A Verma, V Ranga - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …

A survey of potential security issues in existing wireless sensor network protocols

I Tomić, JA McCann - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …

A systematic review on heterogeneous routing protocols for wireless sensor network

S Tanwar, N Kumar, JJPC Rodrigues - Journal of network and computer …, 2015 - Elsevier
The latest developments in wireless communication are more focused on delivering
sensitive information to its final destination under several constraints such as energy …

Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks

JP Amaral, LM Oliveira, JJPC Rodrigues… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
The recent years realize a progressive transition where fixed computing reached maturity
and the mobility age started to thrive. Nowadays, another transition from the mobility age to …

Distributed database management techniques for wireless sensor networks

O Diallo, JJPC Rodrigues, M Sene… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In sensor networks, the large amount of data generated by sensors greatly influences the
lifetime of the network. To manage this amount of sensed data in an energy-efficient way …

6LowPSec: An end-to-end security protocol for 6LoWPAN

G Glissa, A Meddeb - Ad Hoc Networks, 2019 - Elsevier
Abstract 6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …

[HTML][HTML] A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

G Abbas, M Tanveer, ZH Abbas, M Waqas, T Baker… - PloS one, 2021 - journals.plos.org
One of the significant challenges in the Internet of Things (IoT) is the provisioning of
guaranteed security and privacy, considering the fact that IoT devices are resource-limited …

A novel insider attack and machine learning based detection for the internet of things

M Chowdhury, B Ray, S Chowdhury… - ACM Transactions on …, 2021 - dl.acm.org
Due to the widespread functional benefits, such as supporting internet connectivity, having
high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) …

[HTML][HTML] A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues

G Sharma, S Vidalis, N Anand, C Menon, S Kumar - Electronics, 2021 - mdpi.com
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …