2014
DOI: 10.1109/jiot.2014.2359538
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis

Abstract: With the emergence of the Internet of Things (IoT), many devices organized into network, communicate by themselves on the Internet and send data, or private information on the web. It is essential to secure the transmitted data and the identities that may be disclosed to make these new technologies accepted by the largest number of citizens. However, the security mechanisms widely used on the Internet are too heavy to be integrated on small constrained objects. This paper describes the current protocols and se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(57 citation statements)
references
References 12 publications
0
57
0
Order By: Relevance
“…But, the Maximum Transferrable Unit (MTU) of IPV6 is 1280 bytes. 6LoWPAN adaptation layer provides fragmentation and re‐ordering, and compression of the protocol stack headers of IPv6 packets to maintain the communication compatibility between IEEE 802.15.4 frame and the legacy Internet message packet . LAUP works on transport layer of the 6LoWPAN protocol.…”
Section: Proposed Workmentioning
confidence: 99%
“…But, the Maximum Transferrable Unit (MTU) of IPV6 is 1280 bytes. 6LoWPAN adaptation layer provides fragmentation and re‐ordering, and compression of the protocol stack headers of IPv6 packets to maintain the communication compatibility between IEEE 802.15.4 frame and the legacy Internet message packet . LAUP works on transport layer of the 6LoWPAN protocol.…”
Section: Proposed Workmentioning
confidence: 99%
“…The study of Hennerbert and Santos [24] shows the application of IoT on the internet to send the data, private information over the web. It is essential to have a security protocol for the transferred data and the unique identities that might be disclosed for them to be made the function with the population of the citizens.…”
Section: Communications On Applied Electronics (Cae) -Issn : 2394-471mentioning
confidence: 99%
“…This combination is implemented in the layer 3 of OSI layer. Hennebert and Dos Santos (2014) address the security features of constrained devices. Uses the inbuilt TSCH, DTLS and IP security mode of IEEE 802.15.43 and embedded into 6LoWPAN of OSI Layer.…”
Section: Literature Surveymentioning
confidence: 99%