Related references
Note: Only part of the references are listed.Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
S. Gladson Oliver et al.
COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2022)
Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library
Wen-Chung Tsai et al.
SENSORS (2022)
Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks
Nasr Abosata et al.
SENSORS (2022)
A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
R. Hajian et al.
INTERNET OF THINGS (2022)
A framework for harmonizing internet of things (IoT) in cloud: analyses and implementation
Md Motaharul Islam et al.
WIRELESS NETWORKS (2021)
Modeling and simulation of the IEEE 802.11e wireless protocol with hidden nodes using Colored Petri Nets
Estefania Coronado et al.
SOFTWARE AND SYSTEMS MODELING (2021)
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
Suman Majumder et al.
WIRELESS PERSONAL COMMUNICATIONS (2021)
A hierarchical formal method for performance evaluation of WSNs protocol
Siham Zroug et al.
COMPUTING (2021)
Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network
Fuyuan Luo et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS
Santiago Figueroa-Lorenzo et al.
ACM COMPUTING SURVEYS (2020)
An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
Bander A. Alzahrani et al.
ELECTRONICS (2020)
Towards formal verification of IoT protocols: A Review
Katharina Hofer-Schmitz et al.
COMPUTER NETWORKS (2020)
6LowPSec: An end-to-end security protocol for 6LoWPAN
Ghada Glissaa et al.
AD HOC NETWORKS (2019)
Analysis of CoAP implementations for industrial Internet of Things: a survey
Markel Iglesias-Urkia et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
Ashok Kumar Das et al.
IEEE ACCESS (2019)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
Floris Van den Abeele et al.
SENSORS (2017)
Performance evaluation of lightweight and secure protocol for wireless sensor networks: A protocol to enable Web services in IPv6 over low-power wireless personal area networks
Patricia E. Figueroa et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)
Formal modelling and analysis of DNP3 secure authentication
Raphael Amoah et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Lightweight security scheme for IoT applications using CoAP
Arijit Ukil et al.
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS (2014)
On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method
Yongyuth Permpoontanalarp et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2012)