2022
DOI: 10.3390/s22010340
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library

Abstract: The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated the need for a network infrastructure that provides timely and safe information exchange services. A shortcoming of many existing networks is the use of static key authentication. To enable the use of automatic key update mechanisms in IoT devices and enhance securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 24 publications
1
1
0
Order By: Relevance
“…However, sensors with limited resources as end nodes should only respond without providing the function of initiating data, as they require data from users and taking into account their limited hardware. This has been previously explained (see, e.g., [ 1 , 18 , 26 ]). However, the CoAP network architecture assumed in the literature [ 22 ] is the same as that in [ 20 ].…”
Section: Related Worksupporting
confidence: 63%
“…However, sensors with limited resources as end nodes should only respond without providing the function of initiating data, as they require data from users and taking into account their limited hardware. This has been previously explained (see, e.g., [ 1 , 18 , 26 ]). However, the CoAP network architecture assumed in the literature [ 22 ] is the same as that in [ 20 ].…”
Section: Related Worksupporting
confidence: 63%
“…Several considerations, including the type of device and the task it will carry out, determine the optimal protocol for every given Internet of Things application. Constraint Application Protocol (CoAP) [16][17][18] and Message Queueing Telemetry Transport (MQTT) [19][20][21] are the most often used application protocols. CoAP was developed to let low-power, low-resource devices connect to the Internet of Things via slow, unreliable networks.…”
Section: Application Layermentioning
confidence: 99%