2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) 2015
DOI: 10.1109/wf-iot.2015.7389141
|View full text |Cite
|
Sign up to set email alerts
|

Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 36 publications
(11 citation statements)
references
References 14 publications
0
10
0
1
Order By: Relevance
“…Several standards have been proposed to establish End-to-End (E2E) security and key establishment in IoT, like Datagram Transport Layer Security [7], Internet Key Exchange (IKEv2) scheme [8], and HIP-DEX [9] protocols. An interesting approach to further improve these standards has been suggested in [10], [11] and [12]. In these papers, a proxy-based solution is proposed for delegating the heavy cryptographic operations from a constrained device to less constrained nodes in its neighbourhood.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Several standards have been proposed to establish End-to-End (E2E) security and key establishment in IoT, like Datagram Transport Layer Security [7], Internet Key Exchange (IKEv2) scheme [8], and HIP-DEX [9] protocols. An interesting approach to further improve these standards has been suggested in [10], [11] and [12]. In these papers, a proxy-based solution is proposed for delegating the heavy cryptographic operations from a constrained device to less constrained nodes in its neighbourhood.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The suitability of existing cryptographic techniques for IoT devices requires appropriate analysis to ensure that given cryptographic algorithms can successfully be implemented within the constrained memory and processor speeds present in IoT devices. 25,26 There is a need for lightweight and efficient implementations of security protocols and cryptographic algorithms for IoT applications.…”
Section: Encryption Of Communicationsmentioning
confidence: 99%
“…Several techniques has been proposed in the literature to keep these set of constraints controlled in different environments and specific solutions [27][28][29], including the for security and privacy applications [30,31].…”
Section: Ghost Hardware Platformsmentioning
confidence: 99%