2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) 2012
DOI: 10.1109/wcncw.2012.6215494
|View full text |Cite
|
Sign up to set email alerts
|

Secure bootstrapping of nodes in a CoAP network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…It is worth mentioning there is also another set of solutions [ 64 , 65 , 66 , 67 , 68 , 69 ] that show the need for a bootstrapping process but they do not consider EAP or AAA infrastructures as part of their solution. In this sense, they do not support federated authentication and authorization, so limiting the deployment to small or medium scale scenarios.…”
Section: State Of the Artmentioning
confidence: 99%
“…It is worth mentioning there is also another set of solutions [ 64 , 65 , 66 , 67 , 68 , 69 ] that show the need for a bootstrapping process but they do not consider EAP or AAA infrastructures as part of their solution. In this sense, they do not support federated authentication and authorization, so limiting the deployment to small or medium scale scenarios.…”
Section: State Of the Artmentioning
confidence: 99%
“…In the literature, several works focus on the identification of specific mitigation measures for different scenarios (see, e.g., [43][44][45][46][47][48][49][50][51][52][53][54]). In detail, the mitigations proposed by these works mainly focus on two aspects:…”
Section: Mitigationsmentioning
confidence: 99%
“…In fact, it allows a node to collect the information necessary to join a CoAP-enabled network as an authenticated node. In this framework, Bergmann et al [44] propose a three-step process to bootstrap a new node. The process starts with a discovery phase where the new node is detected.…”
mentioning
confidence: 99%
“…Other works discuss secure healthcare architecture and communication of nodes in a Constrained Application Protocol (CoAP; an application layer protocol that is prepared for use in Internet devices in IoT smart homes, such as wireless sensor network nodes) network [19], as well as security challenges between heterogeneous devices and different applications in smart homes [7]. Some studies focus on password security and applications for IoT smart home systems [20] [21], secure software updates in smart home devices, and security system devices (e.g., surveillance cameras) and their use in smart homes [22].…”
Section: High (H)mentioning
confidence: 99%