2015 IEEE Symposium on Computers and Communication (ISCC) 2015
DOI: 10.1109/iscc.2015.7405613
|View full text |Cite
|
Sign up to set email alerts
|

A DTLS-based security architecture for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…This DTLS provides communications privacy for datagram protocols based on the stream-oriented Transport Layer Security (TLS) [213]. This protocol helps to enhance the security of others' higher layers protocols like CoAP [214,215]. Finally, iBeacon is the fifth on this list with nine documents.…”
Section: Communication Protocols According To Open Systems Interconnementioning
confidence: 99%
“…This DTLS provides communications privacy for datagram protocols based on the stream-oriented Transport Layer Security (TLS) [213]. This protocol helps to enhance the security of others' higher layers protocols like CoAP [214,215]. Finally, iBeacon is the fifth on this list with nine documents.…”
Section: Communication Protocols According To Open Systems Interconnementioning
confidence: 99%
“…There are a few works on offloading the entire handshaking process of datagram transport layer security (DTLS), which is limited to messages of a 1500-byte size [ 27 ]. For instance, the authors in [ 9 ] design an architecture that enables resource-constrained devices to establish end-to-end secure communication using DTLS. A dedicated network node is proposed to perform handshake offloading on behalf of an IoT station.…”
Section: Related Workmentioning
confidence: 99%
“…The literature contains several works that study the performance of TLS and DTLS in the context of the IoT. They majorly focus the cryptographic overhead of the protocols and propose alternative schemes to offload the resource-demanding computations, in particular asymmetric cryptography [ 32 , 33 , 34 , 35 ].…”
Section: Related Workmentioning
confidence: 99%