2013 IEEE International Conference on Sensing, Communications and Networking (SECON) 2013
DOI: 10.1109/sahcn.2013.6645024
|View full text |Cite
|
Sign up to set email alerts
|

Combined secure storage and communication for the Internet of Things

Abstract: The future Internet of Things (IoT) may be based on the existing and established Internet Protocol (IP). Many IoT application scenarios will handle sensitive data. However, as security requirements for storage and communication are addressed separately, work such as key management or cryptographic processing is duplicated. In this paper we present a framework that allows us to combine secure storage and secure communication in the IP-based IoT. We show how data can be stored securely such that it can be delive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 20 publications
(21 reference statements)
0
6
0
Order By: Relevance
“…Some efforts have already been done to define the proper languages for the specification of privacy policies, but a standard which addresses specifically IoT paradigm is still missing. [104], existing deployments might not support the IP protocol within the local area scope, thus requiring ad hoc gateways and middlewares [5]. Root key is used to derive service keys through authentication, and key agreement between the device or gateway and the M2M SCs at the M2M Core.…”
mentioning
confidence: 99%
“…Some efforts have already been done to define the proper languages for the specification of privacy policies, but a standard which addresses specifically IoT paradigm is still missing. [104], existing deployments might not support the IP protocol within the local area scope, thus requiring ad hoc gateways and middlewares [5]. Root key is used to derive service keys through authentication, and key agreement between the device or gateway and the M2M SCs at the M2M Core.…”
mentioning
confidence: 99%
“…Since the nodes have very less memory they can't store huge amounts of data or are capable of doing huge computations and thus off-load them to powerful cloud servers. Stored data [12] should be properly signed and encrypted so that they are genuine data and not readable by an anonymous entity.…”
Section: Data Transmission and Storage Securitymentioning
confidence: 99%
“…cfs_read(fd,buf,sizeof(buf)); [15] #endif [16] cfs_close(fd); [18] } [16] transmit_data(buf, skip_encryption); [17] PROCESS_END(); [18] } Algorithm 3 A simple Contiki application program to read an encrypted data from a file for in-node processing using CFS. n+=cfs_read(fd,buf+n, sizeof(buf)); [10] if(n<sizeof(buf)) [11] PROCESS_WAIT_UNTIL(ev == KEY_READY); [12] } [13] #else [14] cfs_read(fd,buf, sizeof(buf)); [15] #endif [16] cfs_close(fd); [17] PROCESS_END();…”
Section: Contiki File System Microlog Extensionmentioning
confidence: 99%
“…We use and extend Codo for secure storage in Fusion. Also, we have proposed mechanisms to use IPsec for both storage and communication security . Fusion is a generic coalesced secure storage and communication framework that can be used with IPsec, DTLS, HIP, and so on.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation