2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2012
DOI: 10.1109/wowmom.2012.6263790
|View full text |Cite
|
Sign up to set email alerts
|

Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples

Abstract: In this paper we discuss security procedures for constrained IoT devices. We start with the description of a general security architecture along with its basic procedures, then discuss how its elements interact with the constrained communication stack and explore pros and cons of popular security approaches at various layers of the ISO/OSI model. We also discuss a practical example for the establishment of end-to-end secure channels between constrained and unconstrained devices. The proposed method is lightwei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
39
0
4

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 107 publications
(46 citation statements)
references
References 16 publications
0
39
0
4
Order By: Relevance
“…An interesting work described in [3] intends to secure the IoT devices. They propose an authentication mechanism based on shared key between constrained (Cd) and unconstrained (Ud) devices.…”
Section: Related Workmentioning
confidence: 99%
“…An interesting work described in [3] intends to secure the IoT devices. They propose an authentication mechanism based on shared key between constrained (Cd) and unconstrained (Ud) devices.…”
Section: Related Workmentioning
confidence: 99%
“…A detailed survey on the working, implementation, advantages and disadvantages of IoT is depicted in [7]. [8] gives the complete view on secure communication for smart IoT Objects.…”
Section: Related Workmentioning
confidence: 99%
“…The idea is to take advantage of more powerful nodes in the neighborhood of a constrained node to carry heavy computations in a distributed way. Likewise, IKE session establishment delegation to a gateway have been proposed in (Bonetto et al, 2012). Furthermore, authors in (Freeman et al, 2007) introduced a delegation procedure that enables a client to delegate certificate validation to a trusted server.…”
Section: Related Workmentioning
confidence: 99%