Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security mechanisms and technologies for constrained iot devices
RISE Research Institutes of Sweden, Digital Systems, Data Science.ORCID iD: 0000-0001-8842-9810
RISE Research Institutes of Sweden, Digital Systems, Data Science.ORCID iD: 0000-0001-8192-0893
2025 (English)In: Internet of Things A to Z: Technologies and Applications / [ed] Qusay F. Hassan, Wiley , 2025, 2, p. 495-522Chapter in book (Other academic)
Abstract [en]

The Internet of Things (IoT) has enabled as well as boosted several applications that will radically change everyday life, including smart building, environmental monitoring, smart energy grids, and intelligent transportation. Unlike traditional IT systems, IoT deployments will be directly exposed and reachable over the Internet, and massively composed of constrained devices equipped with limited resources. In such a context, security has been unanimously acknowledged as a fundamental requirement to fulfill, with evident implications on service reliability, privacy, and even safety of facilities and people. At the same time, it is particularly challenging to effectively and efficiently ensure security in the IoT, given the wide range of heterogeneous, dynamic, and possibly large‐scale environments, and the resource‐constrained nature of deployed devices. This chapter overviews the current main security protocols and technologies for the IoT, presents related security issues, and discusses solutions to address them based on recent research and standardization activities

Place, publisher, year, edition, pages
Wiley , 2025, 2. p. 495-522
Keywords [en]
Access Control; Authorization; Denial of Service; Intrusion Detection; IoT security; Jamming attack; Key Management; Secure communication; Security protocols; Security standardization
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-80311DOI: 10.1002/9781394280490.ch20Scopus ID: 2-s2.0-105025621998OAI: oai:DiVA.org:ri-80311DiVA, id: diva2:2029033
Available from: 2026-01-16 Created: 2026-01-16 Last updated: 2026-01-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Tiloca, MarcoRaza, Shahid

Search in DiVA

By author/editor
Tiloca, MarcoRaza, Shahid
By organisation
Data Science
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 6 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf