2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems 2012
DOI: 10.1109/ccis.2012.6664544
|View full text |Cite
|
Sign up to set email alerts
|

Application of dynamic variable cipher security certificate in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…Some researchers propose to standardize IoT communication protocols, for example, DTLS optimization has been suggested to secure the IoT data exchange [5]. Implementation of IEEE 802.15.4-compliant link layer security procedures is advised in [6] and a lightweight encryption/decryption method for ID authentication among nodes in sensor layer has been presented in [7]. Concepts from Artificial Immune System (AIS) have been imported to detect attacks on IoT and have used those concepts to develop an IoT intrusion detection system with dynamic defense [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Some researchers propose to standardize IoT communication protocols, for example, DTLS optimization has been suggested to secure the IoT data exchange [5]. Implementation of IEEE 802.15.4-compliant link layer security procedures is advised in [6] and a lightweight encryption/decryption method for ID authentication among nodes in sensor layer has been presented in [7]. Concepts from Artificial Immune System (AIS) have been imported to detect attacks on IoT and have used those concepts to develop an IoT intrusion detection system with dynamic defense [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Second, node is exposed. Third, network topology is dynamic [8]. Emergence of IoT will generate only when strong security solutions are in place.…”
Section: Characteristics Security Issues Of Internet Of Thingsmentioning
confidence: 99%
“…Another method for ID authentication at sensor nodes of IoT is presented by Wen et al in [9]. It is a one-time one cipher method based on request-reply mechanism.…”
Section: Authentication Measuresmentioning
confidence: 99%
“…The above listed security issues at perception layer can be coped with by using encryption (which can be point-to-point or end-to-end), authentication (to verify true identity of sender) and access control [9]. Further security measures and protocols to address this issue are given in Section 4.…”
Section: Perception Layermentioning
confidence: 99%
See 1 more Smart Citation