Securing the Internet of Things: A Standardization Perspective

@article{Keoh2014SecuringTI,
  title={Securing the Internet of Things: A Standardization Perspective},
  author={Sye Loong Keoh and Sandeep S. Kumar and Hannes Tschofenig},
  journal={IEEE Internet of Things Journal},
  year={2014},
  volume={1},
  pages={265-275}
}
The Internet of Things (IoT) is the next wave of innovation that promises to improve and optimize our daily life based on intelligent sensors and smart objects working together. Through Internet Protocol (IP) connectivity, devices can now be connected to the Internet, thus allowing them to be read, controlled, and managed at any time and at any place. Security is an important aspect for IoT deployments. However, proprietary security solutions do not help in formulating a coherent security… CONTINUE READING
Highly Cited
This paper has 212 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 110 extracted citations

The Internet of Things: a security point of view

Internet Research • 2016
View 6 Excerpts
Highly Influenced

Aggregation and scheduling in CoAP/Observe based wireless sensor networks

2015 IEEE International Conference on Communications (ICC) • 2015
View 4 Excerpts
Method Support
Highly Influenced

Securing IoT microservices with certificates

NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium • 2018
View 3 Excerpts
Highly Influenced

An energy efficient sensor for thyroid monitoring through the IoT

2016 17th International Conference on Thermal, Mechanical and Multi-Physics Simulation and Experiments in Microelectronics and Microsystems (EuroSimE) • 2016
View 2 Excerpts
Highly Influenced

Dynamic Aggregation and Scheduling in CoAP/Observe-Based Wireless Sensor Networks

IEEE Internet of Things Journal • 2016
View 4 Excerpts
Method Support
Highly Influenced

Strategies in Smart Service Systems Enabled Multi-sided Markets: Business Models for the Internet of Things

2015 48th Hawaii International Conference on System Sciences • 2015
View 4 Excerpts
Highly Influenced

213 Citations

0204060'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 213 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 46 references

DTLS in constrained environment (DICE) WG

IETF
2013. • 2013
View 8 Excerpts
Highly Influenced

DTLS-based multicast security for low-power and lossy networks

S. L. Keoh, S. S. Kumar, O. Garcia-Morchon, E. Dijk
draft-keoh-dicemulticast-security-06, IETF, 2013. • 2013
View 3 Excerpts
Highly Influenced

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks

2008 International Conference on Information Processing in Sensor Networks (ipsn 2008) • 2008
View 3 Excerpts
Highly Influenced

A DTLS 1.2 profile for the Internet of Things

K. Hartke, H. Tschofenig
draft-ietf-dice-profile-00, IETF, 2014. • 2014
View 1 Excerpt

Authentication and authorization for constrained environments (ace) mailing list

IETF
Apr. 2014. • 2014
View 1 Excerpt