Resumen
The IoT opens up a vast area for creative applications that will change the world and human lives. Small, sensitive devices connected to the Internet will enable all-encompassing computing. This study describes widely accepted technologies and standards for IoT networks, and provides an overview of the most well-known security protocols and technologies currently available for adoption in the IoT, at different levels of a typical communication stack. The first section introduces existing IoT security technologies and protocols. The second section of the overview discusses the technologies and protocols used in the IoT. The next section provides a brief overview of the protocols and security mechanisms in the IoT. The last section discusses security issues and solutions, and shows a comparison of the protocols that were previously discussed in the previous sections. In future work, the authors seek to build a security model for interconnected computing devices based on a lightweight and secure authentication scheme for the Internet of Things. This study will simplify the correct navigation of the IoT security protocol stack.