2015
DOI: 10.1016/j.adhoc.2015.01.006
|View full text |Cite
|
Sign up to set email alerts
|

Survey on secure communication protocols for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
130
0
3

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 301 publications
(148 citation statements)
references
References 42 publications
0
130
0
3
Order By: Relevance
“…Basically, we highlight resources constraints, heterogeneity and scalability challenges which are more likely common to several applications. Indeed, most of applications operate in highly distributed environments with the use of heterogeneous smart objects, sensors and actuators that are limited in terms of power and computation resources [94,111]. These three challenges make the security very hard to solve with current approaches.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Basically, we highlight resources constraints, heterogeneity and scalability challenges which are more likely common to several applications. Indeed, most of applications operate in highly distributed environments with the use of heterogeneous smart objects, sensors and actuators that are limited in terms of power and computation resources [94,111]. These three challenges make the security very hard to solve with current approaches.…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand, in [98] Ouaddah et al reviewed access control solutions. In [94], Kim et al gave a classification of key management solutions in IoT. In those surveys, the authors focused particularly on classical based cryptographic approaches without discussing the new relevant techniques which could potentially bring huge values in terms of security and privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Our analysis is based on security properties of security protocols in IoT presented in [18] [19]. For the following discussion, we consider that our communication channel divides into two segments (explained in figure 3):  Confidentiality: the confidentiality of exchange messages in our protocol is realized in two segments.…”
Section: Security Analysismentioning
confidence: 99%
“…Using local knowledge of the shared nonce, each member can generate and share a large number of secure keys. We assume that before joining the group the requesting member/group is authenticated by an independent authentication entity using independent authentication protocol, largely discussed in literature [20][21][22][23], and further assume that the secrete nonce of sponsor member is known to the authentication entity. In the subsequent section, we explain the characteristics of the group and the keying system in detail.…”
Section: System Overviewmentioning
confidence: 99%