2016
DOI: 10.1007/978-3-319-31875-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In the literature, several works focus on the identification of specific mitigation measures for different scenarios (see, e.g., [43][44][45][46][47][48][49][50][51][52][53][54]). In detail, the mitigations proposed by these works mainly focus on two aspects:…”
Section: Mitigationsmentioning
confidence: 99%
“…In the literature, several works focus on the identification of specific mitigation measures for different scenarios (see, e.g., [43][44][45][46][47][48][49][50][51][52][53][54]). In detail, the mitigations proposed by these works mainly focus on two aspects:…”
Section: Mitigationsmentioning
confidence: 99%
“…TinyDTLS is an open source library implementing minimum functions provided in the DTLS protocol with C language. The most up-to-date version is 0.8.2 as at the writing of this paper and it supports the DTLS 1.2 standards [6]. TinyDTLS consists of an algorithm that implements the DTLS, encryption, hash, session management, and queue management as separate modules.…”
Section: Tinydtlsmentioning
confidence: 99%
“…However, most daily life objects, which are intended to support smart service, are present as embedded forms so their computing resources such as CPU, memory, and battery are limited compared to general computing devices used in the Internet. In particular, low energy consumption of functions is the core requirement to provide services reliably and to reduce cost of developing an IoT device [6].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, DTLS uses stateless encryption, thus no steam ciphers [18]. Fragmentation at the UDP level uses more device resources [35], which impacts on IoT devices. Lastly, reemission is more complex in DTLS.…”
Section: Introductionmentioning
confidence: 99%