2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) 2014
DOI: 10.1109/sahcn.2014.6990364
|View full text |Cite
|
Sign up to set email alerts
|

Delegation-based authentication and authorization for the IP-based Internet of Things

Abstract: Abstract-IP technology for resource-constrained devices enables transparent end-to-end connections between a vast variety of devices and services in the Internet of Things (IoT). To protect these connections, several variants of traditional IP security protocols have recently been proposed for standardization, most notably the DTLS protocol. In this paper, we identify significant resource requirements for the DTLS handshake when employing public-key cryptography for peer authentication and key agreement purpos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
70
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 113 publications
(70 citation statements)
references
References 23 publications
0
70
0
Order By: Relevance
“…Additionally, analyzes exist that investigate the technical challenges and limitations of the IP-based IoT [8,9], though the aspect of involving the user in the security of the connection between IoT devices is not considered. To our knowledge there is no known approach to involve the user in the wireless network security, particularly not for IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, analyzes exist that investigate the technical challenges and limitations of the IP-based IoT [8,9], though the aspect of involving the user in the security of the connection between IoT devices is not considered. To our knowledge there is no known approach to involve the user in the wireless network security, particularly not for IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Previously, solutions have been developed to protect communication between resource-constrained IoT by using lightweight IPsec [18], DTLS [17] [19], and link-layer security [18]. In addition to the communication security, network security in the IoT is also provided using an intrusion detection system [20], and an efficient solution to protect stored data inside a resource constrained node is also proposed [21].…”
Section: Related Workmentioning
confidence: 99%
“…In order to mitigate DoS attacks, todays servers offload the corresponding security context toward clients. In [2], we introduce a constrained-device-friendly session resumption method that allows for offloading the security context towards the more powerful end-point.…”
Section: Framework Designmentioning
confidence: 99%
“…Traditionally, PKC has been considered not feasible for constrained devices [3]. Existing ECC libraries for constrained devices require few KBytes 2 Certificate Transparency (RFC 6962), http://www.certificatetransparency.org, log trace with 2.8 million entries retrieved at October 17, 2013 of static RAM and in order of 10 KBytes of ROM. Given that PKC is used only at session establishments, dedicating memory space during the whole life cycle of a smart device for PKC means less memory space for applications.…”
Section: Framework Designmentioning
confidence: 99%