IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

[HTML][HTML] Performance evaluation of CoAP and MQTT with security support for IoT environments

V Seoane, C Garcia-Rubio, F Almenares, C Campo - Computer Networks, 2021 - Elsevier
World is living an overwhelming explosion of smart devices: electronic gadgets, appliances,
meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to …

EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis

EL Pérez, G Selander, JP Mattsson, T Watteyne… - Computer, 2024 - ieeexplore.ieee.org
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis Page 1
COMPUTER 0018-9162/24©2024IEEE PUBLISHED BY THE IEEE COMPUTER SOCIETY …

Application layer key establishment for end-to-end security in IoT

S Pérez, JL Hernández-Ramos, S Raza… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …

Content object security in the internet of things: challenges, prospects, and emerging solutions

C Gündoğan, C Amsüss, TC Schmidt… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Content objects are confined data elements that carry meaningful information. Massive
amounts of content objects are published and exchanged every day on the Internet. The …

[HTML][HTML] Blockchain-based context-aware authorization management as a service in iot

T Sylla, L Mendiboure, MA Chalouf, F Krief - Sensors, 2021 - mdpi.com
Internet of Things (IoT) applications bring evolved and intelligent services that can help
improve users' daily lives. These applications include home automation, health care, and …

IoT content object security with OSCORE and NDN: A first experimental comparison

C Gündoğan, C Amsüss, TC Schmidt… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by
low power lossy links and gateways that perform protocol translations. Protocols such as …

Trusted lightweight communication for IoT systems using hardware security

A Durand, P Gremaud, J Pasquier… - Proceedings of the 9th …, 2019 - dl.acm.org
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of
Things (IoT) systems based on web protocols. In this context, we evaluated the use of …

Careful with MAc-then-SIGn: A computational analysis of the EDHOC lightweight authenticated key exchange protocol

F Günther, MIT Mukendi - 2023 IEEE 8th European Symposium …, 2023 - ieeexplore.ieee.org
EDHOC is a lightweight authenticated key exchange protocol for IoT communication,
currently being standardized by the IETF. Its design is a trimmed-down version of similar …

The cost of OSCORE and EDHOC for constrained devices

S Hristozov, M Huber, L Xu, J Fietz, M Liess… - Proceedings of the …, 2021 - dl.acm.org
Many modern IoT applications rely on the Constrained Application Protocol (CoAP).
Recently, the Internet Engineering Task Force (IETF) proposed two novel protocols for …