Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples

R Bonetto, N Bui, V Lakkundi… - … symposium on a …, 2012 - ieeexplore.ieee.org
… paper a suitable security architecture for IoT with the following objectives: 1) security suites
… the UCN side, 2) originating security handshakes/procedures are handled differently within …

A comprehensive review of internet of things: Technology stack, middlewares, and fog/edge computing interface

O Ali, MK Ishak, MKL Bhatti, I Khan, KI Kim - Sensors, 2022 - mdpi.com
… In this study, we look at middleware technologies based on the categories of security,
privacy, and trust, which are the most important open research areas in this field. Similarly, …

A survey of IoT protocols and their security issues through the lens of a generic IoT stack

J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
… As stated in Section 1.2, our contribution in this survey is to describe fundamental security
issues of IoT networks, regardless of the IoT protocol stack used. These issues, as illustrated in …

[PDF][PDF] Secure IoT: An Improbable Reality.

N Mannilthodi, JM Kannimoola - IoTBDS, 2017 - scitepress.org
… We discuss the security challenges caused … secure framework for IoT. The economical and
practical reasons make it impossible to puzzle out the various security challenges in IoT stack. …

Security considerations in the Internet of Things Protocol Stack

KK Nair, HD Nair - … Intelligence, Big Data, Computing and Data …, 2021 - ieeexplore.ieee.org
stack architecture, this research laid out the key security … of the loT security protocol stack
with countermeasures. And … evaluation of loT security, it is learned that the loT device security is …

IoT Technology Stack for Future Generations

P Sailaja - Proceedings of the First International Conference on …, 2021 - eudl.eu
… ML role and DL role in IoT from privacy and security perspective. Authors had discussed
about the privacy and security challenges of IoT, security requirements and attack vectors. They …

Security of Internet of Things Protocol Stacks

ØL Andersen - 2016 - ntnuopen.ntnu.no
… In order to investigate and discuss security of IoT protocol stacks in this thesis, a list of IoT
specific security … 16, 11] and the authors opinion of important security challenges in the IoT. …

A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks

G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos… - Symmetry, 2020 - mdpi.com
… of the security features of each of the selected IoT protocols. Our … of the protocol stack of
each considered technology with … the basic security features provided per protocol of interest. …

Design and implementation of the secure compiler and virtual machine for developing secure IoT services

YS Lee, J Jeong, Y Son - Future Generation Computer Systems, 2017 - Elsevier
… /trustworthy IoT services by developing technology for IoT secure software development and
secure compiler and virtual machine with a stack monitoring method to develop secure IoT

[PDF][PDF] The industry-first secure IoT stack for RISC-V: a research project

S Pinto, J Martins - RISC-V Workshop,(Zurich), 2019 - sandro2pinto.github.io
secure Internet-of-Things (IoT) systems on RISC-V processors. The proposed horizontal
software stack … -source, commercial-grade technologies readily available today. The bedrock of …