2017
DOI: 10.1016/j.future.2017.06.008
|View full text |Cite
|
Sign up to set email alerts
|

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things

Abstract: Constrained Application Protocol (CoAP) has become the de-facto web standard for the IoT. Unlike traditional wireless sensor networks, Internet-connected smart thing deployments require security. CoAP mandates the use of the Datagram TLS (DTLS) protocol as the underlying secure communication protocol. In this paper we implement DTLS-protected secure CoAP for both resource-constrained IoT devices and a cloud backend and evaluate all three security modes (pre-shared key, raw-public key, and certificate-based) of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 20 publications
(23 reference statements)
0
15
0
Order By: Relevance
“…Topic 12 includes studies on transport protocols for endto-end security [288][289][290]. To achieve end-to-end secure communication between an IoT back end and resourcelimited smart things, various studies on communication protocols such as DTLS and CoAP [291,292] and key setting protocols such as EDHOC have been conducted [293,294].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Topic 12 includes studies on transport protocols for endto-end security [288][289][290]. To achieve end-to-end secure communication between an IoT back end and resourcelimited smart things, various studies on communication protocols such as DTLS and CoAP [291,292] and key setting protocols such as EDHOC have been conducted [293,294].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…CoAP (Constrained Application Protocol) has been introduced by the IETF's (Internet Engineering Task Force) the core working group to ensure the unified transmissions [21,27]. It has been designed specifically to address the issues of low power and low memory devices along with the support of multicast messages and abridged consumption of energy [19]. CoAP uses the UDP as the transport layer protocol so the reliable transmission of packets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The end-to-end secure communication architecture is proposed for a cloud-connected IoT environment. Herein, a constrained application protocol is proposed for a secure communication between IoT and the cloud [5]. A homomorphic encryption system based on the ring learning with error algorithm is used for cloud user authentication [6].…”
Section: Introductionmentioning
confidence: 99%