Subtopic Deep Dive

IoT Network Security Protocols
Research Guide

What is IoT Network Security Protocols?

IoT Network Security Protocols are lightweight authentication, encryption, and key management mechanisms designed for resource-constrained IoT devices operating in 6LoWPAN and CoAP networks.

These protocols counter eavesdropping, DoS, and Sybil attacks in IoT environments. Key works include Mavromoustakis et al. (2016) on IoT in 5G (186 citations) and Simmon et al. (2013) on cyber-physical cloud computing (63 citations). Over 10 papers from 2013-2023 address connectivity and security in heterogeneous systems.

14
Curated Papers
3
Key Challenges

Why It Matters

Secure IoT protocols enable billions of devices in smart cities and industrial IoT without vulnerability to attacks. Mavromoustakis et al. (2016) show integration with 5G for reliable communication. Piltyay et al. (2020) analyze wireless sensor connectivity in 5G-IoT, impacting scalable deployments. Pandey et al. (2022) survey UAV threats, extending to IoT networks for aerial surveillance.

Key Research Challenges

Lightweight Cryptography Constraints

Constrained IoT devices limit heavy encryption like AES due to power and memory limits. Aljazaery et al. (2020) combine hiding and encryption for data security (59 citations). Zholubak and Hlukhov (2013) develop Galois field multipliers for elliptic curve cryptography.

Heterogeneous Network Connectivity

Ensuring secure links in 5G-IoT and wireless sensor networks faces interference and scalability issues. Piltyay et al. (2020) evaluate connectivity in heterogeneous 5G (77 citations). Khujamatov et al. (2020) discuss networking in IoT and cyber-physical systems (45 citations).

Attack Mitigation in Distributed IoT

DoS and Sybil attacks exploit distributed decision-making in IoT. Kim et al. (2014) propose service reliability via request frequency. Pandey et al. (2022) survey UAV threats applicable to IoT communications (100 citations).

Essential Papers

1.

Internet of Things (IoT) in 5G Mobile Technologies

Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla · 2016 · Modeling and optimization in science and technologies · 186 citations

2.

The Performance Evolution of Antivirus Security Systems in Ultradense Cloud Server Using Intelligent Deep Learning

G. Ramesh, J. Logeshwaran, V Aravindarajan · 2022 · 151 citations

When creating an antivirus, not only the latest security mechanisms are taken into account, but also the needs of users. That’s why this antivirus works together at high speed. The program interfac...

3.

Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey

Gaurav K. Pandey, Devendra S. Gurjar, Ha H. Nguyen et al. · 2022 · IEEE Access · 100 citations

Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precisio...

4.

Wireless Sensor Network Connectivity in Heterogeneous 5G Mobile Systems

Stepan Piltyay, Andrew Bulashenko, Ivan Demchenko · 2020 · 77 citations

In this paper we perform the analysis of connectivity of wireless sensor network in heterogeneous 5G mobile systems. Wireless sensor networks are an important part of modern heterogeneous 5G mobile...

5.

A Vision of Cyber-Physical Cloud Computing for Smart Networked Systems

Eric D. Simmon, Kyoung-Sook Kim, Eswaran Subrahmanian et al. · 2013 · 63 citations

6.

Combination of Hiding and Encryption for Data Security

Ibtisam A. Aljazaery, Haider TH. Salim ALRikabi, Mustafa Rabea Aziz · 2020 · International Journal of Interactive Mobile Technologies (iJIM) · 59 citations

<pre>One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messag...

7.

Revolutionizing education: using computer simulation and cloud-based smart technology to facilitate successful open learning

Stamatios Papadakis, Арнольд Юхимович Ків, Hennadiy Kravtsov et al. · 2023 · 52 citations

The article presents the proceedings of two workshops: Cloud-based Smart Technologies for Open Education Workshop (CSTOE 2022) and Illia O. Teplytskyi Workshop on Computer Simulation in Education (...

Reading Guide

Foundational Papers

Start with Simmon et al. (2013) for cyber-physical IoT vision (63 citations), then Zholubak and Hlukhov (2013) for Galois field crypto basics, and Kim et al. (2014) for distributed IoT reliability.

Recent Advances

Study Mavromoustakis et al. (2016, 186 citations) for 5G-IoT integration; Piltyay et al. (2020, 77 citations) for sensor connectivity; Pandey et al. (2022, 100 citations) for attack surveys.

Core Methods

Elliptic curve crypto via Galois multipliers (Zholubak 2013); 5G heterogeneous connectivity analysis (Piltyay 2020); hiding-encryption for data (Aljazaery 2020); request-based reliability (Kim 2014).

How PapersFlow Helps You Research IoT Network Security Protocols

Discover & Search

Research Agent uses searchPapers and exaSearch to find IoT security papers like 'Internet of Things (IoT) in 5G Mobile Technologies' by Mavromoustakis et al. (2016). citationGraph reveals connections to Piltyay et al. (2020) on 5G sensor networks. findSimilarPapers expands to UAV security by Pandey et al. (2022).

Analyze & Verify

Analysis Agent applies readPaperContent to extract protocols from Simmon et al. (2013), then verifyResponse with CoVe checks claims against abstracts. runPythonAnalysis simulates attack resilience using NumPy for DoS modeling from Pandey et al. (2022). GRADE grading scores evidence strength in lightweight crypto papers like Aljazaery et al. (2020).

Synthesize & Write

Synthesis Agent detects gaps in 6LoWPAN security via contradiction flagging across Mavromoustakis et al. (2016) and Piltyay et al. (2020). Writing Agent uses latexEditText, latexSyncCitations, and latexCompile for protocol comparison papers. exportMermaid generates flowcharts of key management from Khujamatov et al. (2020).

Use Cases

"Simulate DoS attack resilience of IoT protocols in 6LoWPAN"

Research Agent → searchPapers → Analysis Agent → runPythonAnalysis (NumPy simulation of packet floods from Pandey et al. 2022) → matplotlib plot of throughput vs. attack intensity.

"Write LaTeX review of lightweight encryption for CoAP IoT"

Research Agent → citationGraph (Mavromoustakis 2016 hub) → Synthesis → gap detection → Writing Agent → latexEditText + latexSyncCitations + latexCompile → PDF with cited protocol tables.

"Find GitHub repos implementing Galois field crypto for IoT"

Research Agent → paperExtractUrls (Zholubak 2013) → Code Discovery → paperFindGithubRepo → githubRepoInspect → verified code snippets for elliptic curves.

Automated Workflows

Deep Research workflow scans 50+ papers via searchPapers on 'IoT security protocols 6LoWPAN', chains citationGraph to foundational Simmon et al. (2013), outputs structured review report. DeepScan applies 7-step CoVe to verify claims in Piltyay et al. (2020) connectivity analysis. Theorizer generates hypotheses on 5G-IoT key management from Mavromoustakis et al. (2016) and Khujamatov et al. (2020).

Frequently Asked Questions

What defines IoT Network Security Protocols?

Lightweight authentication, encryption, and key management for constrained devices in 6LoWPAN and CoAP, evaluated against eavesdropping, DoS, and Sybil attacks.

What are key methods in this subtopic?

Galois field multipliers for elliptic curves (Zholubak and Hlukhov, 2013), hiding-encryption combos (Aljazaery et al., 2020), and request-frequency reliability (Kim et al., 2014).

What are foundational papers?

Simmon et al. (2013) on cyber-physical cloud (63 citations); Zholubak and Hlukhov (2013) on Galois multipliers; Kim et al. (2014) on IoT service reliability.

What open problems exist?

Scalable key management in heterogeneous 5G-IoT (Piltyay et al., 2020); DoS mitigation in distributed networks (Pandey et al., 2022); lightweight crypto for UAV-IoT extensions.

Research Cybersecurity and Information Systems with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching IoT Network Security Protocols with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers