2018 Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC) 2018
DOI: 10.1109/dinwc.2018.8357000
|View full text |Cite
|
Sign up to set email alerts
|

Enhance the security in smart home applications based on IOT-CoAP protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…In [146] was the proposed solution using Privacy-Preserving Communication Protocol, which controls transmission by asymmetric encryption in which secret keys are generated chaotically. A protocol called IOT-CoAP was proposed in [147]. The solution improves the security of data by introducing hash functions SHA-1, SHA224 I SHA 256.…”
Section: B Security In Data Managementmentioning
confidence: 99%
“…In [146] was the proposed solution using Privacy-Preserving Communication Protocol, which controls transmission by asymmetric encryption in which secret keys are generated chaotically. A protocol called IOT-CoAP was proposed in [147]. The solution improves the security of data by introducing hash functions SHA-1, SHA224 I SHA 256.…”
Section: B Security In Data Managementmentioning
confidence: 99%
“… In the P2A architecture, IoT data privacy is considered; however, the integrity of the data is not. A lightweight constrained application protocol (CoAP) proposed in [ 156 ] could be used in communication between IoT devices and fog nodes, handling the integrity of the transmitted message without affecting performance. In TTM [ 136 ], trained models are transferred without considering the integrity of the trained models.…”
Section: Current Ecas-iot Limitationsmentioning
confidence: 99%
“… In TTM [ 136 ], trained models are transferred without considering the integrity of the trained models. A lightweight integrity protocol should be employed in this architecture, such as the one proposed in [ 156 ]. …”
Section: Current Ecas-iot Limitationsmentioning
confidence: 99%
See 2 more Smart Citations