Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …

Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next wave of innovation that promises to improve and
optimize our daily life based on intelligent sensors and smart objects working together …

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ramping commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

Cryptographic extraction and key derivation: The HKDF scheme

H Krawczyk - Annual Cryptology Conference, 2010 - Springer
In spite of the central role of key derivation functions (KDF) in applied cryptography, there
has been little formal work addressing the design and analysis of general multi-purpose …

Analysis of {DTLS} implementations using protocol state fuzzing

P Fiterau-Brostean, B Jonsson, R Merget… - 29th USENIX Security …, 2020 - usenix.org
Recent years have witnessed an increasing number of protocols relying on UDP. Compared
to TCP, UDP offers performance advantages such as simplicity and lower latency. This has …

RFC 7252: The constrained application protocol (CoAP)

Z Shelby, K Hartke, C Bormann - 2014 - dl.acm.org
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use
with constrained nodes and constrained (eg, low-power, lossy) networks. The nodes often …

S3K: Scalable security with symmetric keys—DTLS key establishment for the Internet of Things

S Raza, L Seitz, D Sitenkov… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
DTLS is becoming the de facto standard for communication security in the Internet of Things
(IoT). In order to run the DTLS protocol, one needs to establish keys between the …

Transport layer security

S Turner - IEEE Internet Computing, 2014 - ieeexplore.ieee.org
Transport Layer Security is the standard, widely deployed protocol for securing client-server
communications over the Internet. TLS is designed to prevent eavesdropping, tampering …

Providing user security guarantees in public infrastructure clouds

N Paladi, C Gehrmann… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The infrastructure cloud (IaaS) service model offers improved resource flexibility and
availability, where tenants-insulated from the minutiae of hardware maintenance-rent …

Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E})

R Merget, M Brinkmann, N Aviram… - 30th USENIX Security …, 2021 - usenix.org
Diffie-Hellman key exchange (DHKE) is a widely adopted method for exchanging
cryptographic key material in real-world protocols like TLS-DH (E). Past attacks on TLS-DH …