Establishment to Secure 6LoWPAN Networks.
Iceei2021, 1–6.
Amanlou, S., Hasan, M. K., & Bakar, K. A. A. (2021).
Lightweight and secure authentication scheme for IoT
network based on publish–subscribe fog computing
model. Computer Networks, 199. https://doi.org/
10.1016/j.comnet.2021.108465
Bagwari, A., Bagwari, J., Anand, T., Chaurasia, B. K.,
Gangwar, R. P. S., & Hasan, M. K. (2022). The Role of
IoT in Smart Technologies. In 5G and Beyond (pp. 57–
66). Chapman and Hall/CRC. https://doi.org/10.
1201/9781003045809-6
Burrows, M., Abadi, M., & Needham, R. (1990). Logic of
authentication. ACM Transactions on Computer
Systems, 8(1), 18–36. https://doi.org/10.1145/77
648.77649
Chom Thungon, L., Ahmed, N., Chandra Sahana, S., &
Hussain, M. I. (2020). A lightweight authentication and
key exchange mechanism for IPv6 over low-power
wireless personal area networks-based Internet of
things. Transactions on Emerging Telecommunications
Technologies, 1–18. https://doi.org/10.1002/ett.4033
Dolev, D., & Yao, A. C. (1983). On the Security of Public
Key Protocols. IEEE Transactions on Information
Theory, 29(2), 198–208. https://doi.org/10.1109/
TIT.1983.1056650
Fragkos, G., Minwalla, C., Tsiropoulou, E. E., &
Plusquellic, J. (2022). Enhancing Privacy in PUF-Cash
through Multiple Trusted Third Parties and
Reinforcement Learning. ACM Journal on Emerging
Technologies in Computing Systems, 18(1).
https://doi.org/10.1145/3441139
Gao, L., Zhang, L., Feng, L., & Ma, M. (2020). An Efficient
Secure Authentication and Key Establishment Scheme
for M2M Communication in 6LoWPAN in Unattended
Scenarios. Wireless Personal Communications, 115(2),
1603–1621.https://doi.org/10.1007/s11277-020-07645-z
Hasan, M. K., Shafiq, M., Islam, S., Pandey, B., Baker El-
Ebiary, Y. A., Nafi, N. S., Ciro Rodriguez, R., &
Vargas, D. E. (2021). Lightweight Cryptographic
Algorithms for Guessing Attack Protection in Complex
Internet of Things Applications. Complexity, 2021.
https://doi.org/10.1155/2021/5540296
Hennebert, C., & Santos, J. Dos. (2014). Security protocols
and privacy issues into 6LoWPAN stack: A synthesis.
IEEE Internet of Things Journal, 1(5), 384–398.
https://doi.org/10.1109/JIOT.2014.2359538
Hui, J., & Pascal, T. (2011, August 20). Compression
Format for IPv6 Datagrams over IEEE 802.15.4-Based
Networks. 2011. https://www.hjp.at/doc/rfc/rfc6282.
html
Hussen, H. R., Tizazu, G. A., Ting, M., Lee, T., Choi, Y.,
& Kim, K.-H. (2013). SAKES: Secure authentication
and key establishment scheme for M2M
communication in the IP-based wireless sensor network
(6L0WPAN). In 2013 Fifth International Conference
on Ubiquitous and Future Networks (ICUFN). IEEE.,
246–251. https://doi.org/https://doi.org/10.1109/ICUF
N.2013.6614820
Monika, M., Smita, A., Rakhi, A., Sanjivani, D., Sachi, N.
M., & Suneeta, S. (2022). A Proposed Framework to
Achieve CIA in IoT Networks. International
Conference on Artificial Intelligence and Sustainable
Engineering, 19–30.
Qiu, Y., & Ma, M. (2016). A Mutual Authentication and
Key Establishment Scheme for M2M Communication
in 6LoWPAN Networks. IEEE Transactions on
Industrial Informatics, 12(6), 2074–2085. https://
doi.org/10.1109/TII.2016.2604681
Sarr, A. P., Elbaz-Vincent, P., & Bajard, J.-C. (2010). A
New Security Model for Authenticated Key
Agreement. International Conference on Security and
Cryptography for Networks, 219–234. https://doi
.org/10.1007/978-3-642-15317-4_15
Tanaka, Y., Minet, P., & Watteyne, T. (2019). 6LoWPAN
Fragment Forwarding. IEEE Communications
Standards Magazine, 3(1), 35–39. https://doi.
org/10.1109/MCOMSTD.2019.1800029
Tanveer, M., Abbas, G., Abbas, Z. H., Bilal, M.,
Mukherjee, A., & Kwak, K. S. (2021). LAKE-6SH:
Lightweight User Authenticated Key Exchange for
6LoWPAN-based Smart Homes. IEEE Internet of
Things Journal, 14(8), 1–14. https://doi.org/10.
1109/jiot.2021.3085595
Tanveer, M., Abbas, G., Abbas, Z. H., Waqas, M.,
Muhammad, F., & Kim, S. (2020). S6AE: Securing
6lowpan using authenticated encryption scheme.
Sensors (Switzerland), 20(9), 1–23. https://doi.org/
10.3390/s20092707
Tanveer, M., Khan, A. U., Nguyen, T., Ahmad, M., &
Abdei-Latif, A. (2022). Towards A Secure and
Computational Framework for Internet of Drones
Enabled Aerial Computing. IEEE Transactions on
Network Science and Engineering. https://doi.org/
10.1109/TNSE.2022.3151843
Turan, M., McKay, K., Chang, D., Calik, C., Bassham, L.,
Kang, J., & Kelsey, J. (2021). Status Report on the
Second Round of the NIST Lightweight Cryptography
Standardization Process. https://doi.org/10.6028
/NIST.IR.8369
Wazirali, R., & Ahmad, R. (2022). Machine learning
approaches to detect DoS and their effect on WSNs
lifetime. Computers, Materials and Continua, 70(3),
4921–4946. https://doi.org/10.32604/cmc.2022.020044
Wazirali, R., Ahmad, R., Al-Amayreh, A., Al-Madi, M., &
Khalifeh, A. (2021). Secure watermarking schemes and
their approaches in the iot technology: An overview.
Electronics (Switzerland), 10(14). https://doi.org/1
0.3390/electronics10141744