2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) 2016
DOI: 10.1109/nca.2016.7778645
|View full text |Cite
|
Sign up to set email alerts
|

A back-end offload architecture for security of resource-constrained networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The most efficient alternatives [ 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 ], are based on delegating the whole DTLS handshake on a resource-richer trusted entity and then, leveraging the session resumption feature provided by DTLS in order to convey the session negotiated by the resource-rich entity to the IoT device.…”
Section: Affordable Dtls For Iiot Devicesmentioning
confidence: 99%
See 3 more Smart Citations
“…The most efficient alternatives [ 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 ], are based on delegating the whole DTLS handshake on a resource-richer trusted entity and then, leveraging the session resumption feature provided by DTLS in order to convey the session negotiated by the resource-rich entity to the IoT device.…”
Section: Affordable Dtls For Iiot Devicesmentioning
confidence: 99%
“…Following the same approach, ref. [ 27 ] introduces an architecture based on back-end offloads (BeO nodes), which are powerful devices belonging to the IoT network, where security-related operations are delegated. The difference with respect to previous proposals is that in this case, both the DTLS handshake and the DTLS record are delegated to the BeO nodes.…”
Section: Affordable Dtls For Iiot Devicesmentioning
confidence: 99%
See 2 more Smart Citations