Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples
In this paper we discuss security procedures for constrained IoT devices. We start with the description of a general security architecture along with its basic procedures, then ...