2017
DOI: 10.1007/s11277-017-4176-5
|View full text |Cite
|
Sign up to set email alerts
|

CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things

Abstract: The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communicati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 27 publications
(50 reference statements)
0
5
0
Order By: Relevance
“…Thus, we considered to map briefly the areas where IoT security has been applied based on the current literature. We found application domains of IoT security as follows: ambient assisted living [6], approximate computing [7], big data [8,9], smart building [1], smart city [10], cloud service [11][12][13][14][15], edge computing [16], energy [1], environmental monitoring [1] [17,18], fog computing [19,20], general [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39], general sensing [2,[40][41][42][43][44][45][46], healthcare [1,40,41,…”
Section: Application Domains Of Iot Securitymentioning
confidence: 99%
“…Thus, we considered to map briefly the areas where IoT security has been applied based on the current literature. We found application domains of IoT security as follows: ambient assisted living [6], approximate computing [7], big data [8,9], smart building [1], smart city [10], cloud service [11][12][13][14][15], edge computing [16], energy [1], environmental monitoring [1] [17,18], fog computing [19,20], general [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39], general sensing [2,[40][41][42][43][44][45][46], healthcare [1,40,41,…”
Section: Application Domains Of Iot Securitymentioning
confidence: 99%
“…Similarly, an address update notification is required for mobility and multihoming support. The C-HIP [18] is based on HIP-DEX and has an efficient key establishment component for highly resource-constrained IoT devices. The CHIP delegates expensive cryptographic operations to resource-rich devices in local networks.…”
Section: Key Exchange Protocol For Multihomed Mobile Devicesmentioning
confidence: 99%
“…Even though establishing a secure End to End connection between two unknown sensors in heterogeneous networks has a great probability of establishing insecure communication. CHIP for Collaborative HIP [21] presents a new protocol that is the combination of some features of HIP BEX and HIP DEX. Accordingly to this solution, the authors consider that the responder is the most constrained device than the initiator.…”
Section: Hip-based Solutionsmentioning
confidence: 99%