• Aucun résultat trouvé

[PDF] Top 20 A Lightweight IoT Security Protocol

Has 10000 "A Lightweight IoT Security Protocol" found on our website. Below are the top 20 most common "A Lightweight IoT Security Protocol".

A Lightweight IoT Security Protocol

A Lightweight IoT Security Protocol

... propose a security protocol called HIP (Host Identity ...the security of the constrained devices over LoWPAN (Low power Wire- less Personal Area ...add a central authority for managing ... Voir le document complet

9

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

... HE A RT FOR S ECURE T IME S YNCHRONIZATION Prominent standardized time synchronization protocols are the IETF Network Time Protocol (NTP) [2], IEEE 1588 Precision-Time-Protocol (PTP), and ... Voir le document complet

7

A Lightweight Mutual Authentication Protocol for the IoT

A Lightweight Mutual Authentication Protocol for the IoT

... Authentication Protocol (EAP). In order to ensure a secure communication between two entities, first, they exchange their identities (without any ...without a trusted third party (authentication ... Voir le document complet

11

State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks

State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks

... is a symmetric encryption scheme in which a WEP key is known or shared between two communicating ...is a stream cipher scheme [FM 2001, Mantin 2001] in which the data is encrypted by XORing data with ... Voir le document complet

9

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

... Security and reliability are key parameters of WSN. Our approach is to use trust aspects to improve every aspects and deal with this problem. The trust management is social control mechanism which enable deviant ... Voir le document complet

7

State of the art of IETF security related protocols for IoT

State of the art of IETF security related protocols for IoT

... observe a growing interest on the IETF about constrained environment related working groups and ...Application Protocol (CoAP)[3] (RFC ...standardized a common terminology to be used on future ... Voir le document complet

10

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

... current security design is often weak or flawed, as illustrated by several vulnerabilities such as Mirai, Blueborne, ...presents a novel approach for detecting intrusions in smart spaces such as smarthomes, ... Voir le document complet

9

Serverless lightweight mutual authentication protocol for small mobile computing devices

Serverless lightweight mutual authentication protocol for small mobile computing devices

... Internet Security Protocols and Appli- cations (AVISPA) [4] tool to validate our ...of Security Protocols ...Level Protocol Specification Language (HLPSL) [35] code for our protocol used in ... Voir le document complet

6

A Language for Analyzing Security of IOT Systems

A Language for Analyzing Security of IOT Systems

... represents a successful attack where an employee gets his device infected by the Malware after downloading a malicious program sent by the Attacker as an attached file on an ...sends a confirmation ... Voir le document complet

9

IoT-O, a core-domain IoT ontology to represent connected devices networks

IoT-O, a core-domain IoT ontology to represent connected devices networks

... propose IoT-O, a core-domain modular IoT ontology proposing a vocabulary to describe connected devices and their relation with their ...existing IoT ontologies are described and ... Voir le document complet

17

Designing a Framework for Smart IoT Adaptations

Designing a Framework for Smart IoT Adaptations

... From one engineering process to the other, the fleet’s three dimensions defined in (3.2) have different designations, as described and illustrated in Fig. 3. At the domain level, each one of the concepts contributes to ... Voir le document complet

11

IoT Composer: Composition and Deployment of IoT Applications

IoT Composer: Composition and Deployment of IoT Applications

... the IoT Composer tool, which sup- ports all the steps of the design, composition, and deployment of an IoT application by selecting, configuring and binding available ...the IoT Composer ... Voir le document complet

5

Performance of State Based Key Hop (SBKH) Protocol for Security on Wireless Networks

Performance of State Based Key Hop (SBKH) Protocol for Security on Wireless Networks

... 802.11 security proposals namely WEP, WPA ...encryption protocol for power-limited devices that require security such as the wireless sensor ... Voir le document complet

7

Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey

Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey

... let a non- administrative process (e.g. a container) finely sandbox itself to limit its own rights thus mitigating potential ...provides a way for non-root containers to push eBPF code in the host ... Voir le document complet

7

Extended use of SOA and Cloud Computing Security Gateway Protocol for Big Data analytic sessions

Extended use of SOA and Cloud Computing Security Gateway Protocol for Big Data analytic sessions

... is a vital part of software engineering, and the use of Service-Oriented Architectures (SOA) for Cloud deployable services presents an advanced architectural concept with significance for a system’s ... Voir le document complet

159

A Networked, Lightweight and Partially Reconfigurable Platform

A Networked, Lightweight and Partially Reconfigurable Platform

... as a RDP platform. They have developed a device driver on top of the ...between a remote file system and the ICAP is done at the user level by a shell command or a user ...When a ... Voir le document complet

7

Description of a Lightweight Bartering Grid Architecture

Description of a Lightweight Bartering Grid Architecture

... of a Virtual Organization, or Peers of a Peer-to-Peer Grid, is an important feature of Grid computing because it enables scalable cooperation be- tween entities under separate administrative ...propose ... Voir le document complet

8

Semantic IoT Solutions -A Developer Perspective

Semantic IoT Solutions -A Developer Perspective

... selecting a semantic store. A big drawback of the semantic stores is that they need huge resources to perform the corresponding inferencing, process and load the ...to a server with a ... Voir le document complet

52

A Lightweight Continuous Jobs Mechanism for MapReduce Frameworks

A Lightweight Continuous Jobs Mechanism for MapReduce Frameworks

... from a job while it is being executed by a flush ...return a snapshot of a final output to the users by processing the intermediate ...as a potential approach for running MapReduce jobs ... Voir le document complet

9

Towards a versatile transport protocol

Towards a versatile transport protocol

... PROPOSING A COMPLIANT RELIABLE TRANSPORT PROTOCOL FOR QOS- EN- ABLED NETWORKS The EuQoS project provides a class of service DiffServ/AF- like for Non-Real-Time Traffic ... Voir le document complet

2

Show all 10000 documents...