IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
[HTML][HTML] Performance evaluation of CoAP and MQTT with security support for IoT environments
World is living an overwhelming explosion of smart devices: electronic gadgets, appliances,
meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to …
meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to …
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis Page 1
COMPUTER 0018-9162/24©2024IEEE PUBLISHED BY THE IEEE COMPUTER SOCIETY …
COMPUTER 0018-9162/24©2024IEEE PUBLISHED BY THE IEEE COMPUTER SOCIETY …
Application layer key establishment for end-to-end security in IoT
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
Content object security in the internet of things: challenges, prospects, and emerging solutions
C Gündoğan, C Amsüss, TC Schmidt… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Content objects are confined data elements that carry meaningful information. Massive
amounts of content objects are published and exchanged every day on the Internet. The …
amounts of content objects are published and exchanged every day on the Internet. The …
[HTML][HTML] Blockchain-based context-aware authorization management as a service in iot
Internet of Things (IoT) applications bring evolved and intelligent services that can help
improve users' daily lives. These applications include home automation, health care, and …
improve users' daily lives. These applications include home automation, health care, and …
IoT content object security with OSCORE and NDN: A first experimental comparison
C Gündoğan, C Amsüss, TC Schmidt… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by
low power lossy links and gateways that perform protocol translations. Protocols such as …
low power lossy links and gateways that perform protocol translations. Protocols such as …
Trusted lightweight communication for IoT systems using hardware security
A Durand, P Gremaud, J Pasquier… - Proceedings of the 9th …, 2019 - dl.acm.org
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …
Careful with MAc-then-SIGn: A computational analysis of the EDHOC lightweight authenticated key exchange protocol
F Günther, MIT Mukendi - 2023 IEEE 8th European Symposium …, 2023 - ieeexplore.ieee.org
EDHOC is a lightweight authenticated key exchange protocol for IoT communication,
currently being standardized by the IETF. Its design is a trimmed-down version of similar …
currently being standardized by the IETF. Its design is a trimmed-down version of similar …
The cost of OSCORE and EDHOC for constrained devices
S Hristozov, M Huber, L Xu, J Fietz, M Liess… - Proceedings of the …, 2021 - dl.acm.org
Many modern IoT applications rely on the Constrained Application Protocol (CoAP).
Recently, the Internet Engineering Task Force (IETF) proposed two novel protocols for …
Recently, the Internet Engineering Task Force (IETF) proposed two novel protocols for …