2019
DOI: 10.30534/ijatcse/2019/58832019
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Security Protocols for Internet of Things: A Review

Abstract: Smart devices and IoT applications have been widely used in many fields of social living, social production, home and industrial automation which have made people's life efficient and convenient. But in recent years, ubiquitous deployment of some tools and technologies has raised several concerns related to the privacy and security in IoT enabled smart environment. The present paper presents a range of various existing as well as proposed lightweight security protocols. Security protocols are designed to make … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 51 publications
0
6
0
Order By: Relevance
“…This blockchain reduces the contribution of certificate authority in VANET. Private blockchain gives complete access of ledger to all the nodes [20]. The figure 1 shows the complete architecture of the system, Security aware routing protocol (SARP) in which the vehicles on road is authenticated by the RSU to ensure non-repudiations in the network.…”
Section: System Modelmentioning
confidence: 99%
“…This blockchain reduces the contribution of certificate authority in VANET. Private blockchain gives complete access of ledger to all the nodes [20]. The figure 1 shows the complete architecture of the system, Security aware routing protocol (SARP) in which the vehicles on road is authenticated by the RSU to ensure non-repudiations in the network.…”
Section: System Modelmentioning
confidence: 99%
“…It is known that more than 53% of people are using internet activity actively. This value shows that more than half of people are connected to the internet, communicate with each other using the internet and making money with the internet which exposes them to the threat that can steal and exploit information from them [1] [2]. One approach to defeating these vulnerabilities issues is by utilizing a Virtual Private Network (VPN).…”
Section: Introductionmentioning
confidence: 99%
“…Everyday in environment there are number of devices are being connected to one or many devices globally and many additional smart devices also correlate one another, hence people are now frequently joining smart IoT using these devices [2].Company could use the benefit of IoT as an ITbased tool that's commonly used to analyze company businesses in the digital era. Big number of data can be gathered from the IoT technology, is often involved in decision making processes for enterprise businesses [3].…”
Section: Introductionmentioning
confidence: 99%