2021
DOI: 10.1016/j.iot.2020.100333
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the performance of the OSCORE security protocol in constrained IoT environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 7 publications
0
20
0
Order By: Relevance
“…The security solution allows proxies to perform their functions as forwarding and scheduling CoAP queries connected to servers. OSCORE's effectiveness at protecting and decoding messages is superior to DTLS using HMAC and authenticated encryption associated data AEAD [41]. OSCORE reaches this outcome through a very better execution of the AES encryption [41].…”
Section: Object Security For Constrained Restful Environmentsmentioning
confidence: 99%
See 4 more Smart Citations
“…The security solution allows proxies to perform their functions as forwarding and scheduling CoAP queries connected to servers. OSCORE's effectiveness at protecting and decoding messages is superior to DTLS using HMAC and authenticated encryption associated data AEAD [41]. OSCORE reaches this outcome through a very better execution of the AES encryption [41].…”
Section: Object Security For Constrained Restful Environmentsmentioning
confidence: 99%
“…OSCORE is a new universal solution which offers cover-to-cover protection for CoAP transactions on the application layer [41]. OSCORE is a good choice to security in CoAP protocol than DTLS.…”
Section: Object Security For Constrained Restful Environmentsmentioning
confidence: 99%
See 3 more Smart Citations