2016 International Workshop on Secure Internet of Things (SIoT) 2016
DOI: 10.1109/siot.2016.012
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Secure Communication Protocols for IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
61
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(61 citation statements)
references
References 30 publications
0
61
0
Order By: Relevance
“…The model is agnostic about the communication protocol serving edge devices: therefore, it is the responsibility of the designer to address a stack that guarantees a suitable level of security. In 2016, Dan Dragomir et al [20] listed fifteen of them, each with specific security issues and solutions. It is an extremely active research front with new results continuously appearing.…”
Section: Discussionmentioning
confidence: 99%
“…The model is agnostic about the communication protocol serving edge devices: therefore, it is the responsibility of the designer to address a stack that guarantees a suitable level of security. In 2016, Dan Dragomir et al [20] listed fifteen of them, each with specific security issues and solutions. It is an extremely active research front with new results continuously appearing.…”
Section: Discussionmentioning
confidence: 99%
“…Security remains one of the most important challenges as pointed out by a large number of research papers [13,20,61,[112][113][114][115][116]. Related to security, we focus here on application layer, where it is also necessary to understand the communication challenges related to performance factors such as latency, overhead and packet loss.…”
Section: Securitymentioning
confidence: 99%
“…They elaborated on specific shortcomings and vulnerabilities and showed how these issues have been addressed by the respective protocol throughout its development. In the same year, Dragomir et al [88] focused on the security aspects of IoT protocols, including ZigBee and Thread, as specified by standardization bodies and industry alliances. In addition, the authors of [89] investigated smart home security under the prism of existing standards and mechanisms, including ZigBee, BLE, and Z-Wave.…”
Section: Group IImentioning
confidence: 99%