{"title":"HIP-Based Security in IoT Networks: A comparison","authors":"P. Kanuch, Dominik Macko, L. Hudec","doi":"10.1109/ICETA51985.2020.9379228","DOIUrl":null,"url":null,"abstract":"A huge amount of cybersecurity attacks discovered in recent years, moreover in the last one associated with the pandemic situation, where intruders are trying to exploit the hospitals and research centers. It can be dangerous as nowadays a lot of IoT devices are connected in that area of life. It is one of the several points of our motivation to secure IoT devices or data in Healthcare. In our article, we discussed several approaches dealing with the classification of security attacks. In the next part, we analyzed and compared HIP-based security protocols also used in IoT networks. We also ran experiments to show that it is crucial to bring energy-efficient lightweight, optimized protocol for using in IoT networks within sufficient security strength.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA51985.2020.9379228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
A huge amount of cybersecurity attacks discovered in recent years, moreover in the last one associated with the pandemic situation, where intruders are trying to exploit the hospitals and research centers. It can be dangerous as nowadays a lot of IoT devices are connected in that area of life. It is one of the several points of our motivation to secure IoT devices or data in Healthcare. In our article, we discussed several approaches dealing with the classification of security attacks. In the next part, we analyzed and compared HIP-based security protocols also used in IoT networks. We also ran experiments to show that it is crucial to bring energy-efficient lightweight, optimized protocol for using in IoT networks within sufficient security strength.