Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy 2013
DOI: 10.1145/2463183.2463193
|View full text |Cite
|
Sign up to set email alerts
|

Towards viable certificate-based authentication for the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
4

Year Published

2013
2013
2022
2022

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 112 publications
(69 citation statements)
references
References 5 publications
0
65
0
4
Order By: Relevance
“…Hummen et al [16] deal with the constraints of IoT objects and processing the certificate-based DTLS handshakes. They propose three ideas that are based on a pre-validation, a session resumption and a handshake delegation to reduce computation and memory overheads.…”
Section: Overview Of Secure Communication Authentication and Key Estmentioning
confidence: 99%
“…Hummen et al [16] deal with the constraints of IoT objects and processing the certificate-based DTLS handshakes. They propose three ideas that are based on a pre-validation, a session resumption and a handshake delegation to reduce computation and memory overheads.…”
Section: Overview Of Secure Communication Authentication and Key Estmentioning
confidence: 99%
“…Figure. Nevertheless IPv6 address space of up to 3.4×1038 will accommodate as many as 4,000 addresses for every individual of the world; the added functionalities like automatic address configuration are also going to make scalability easier. In the process of securing IoT and making it compatible with Internet, IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) [5], Routing Over Low-power and Lossy networks (RPL) [6], Datagram Transport Layer Security (DTLS) [7], Constrained Application Protocol (CoAP ) [8] have surfaced as approved lightweight variants to IPv6, IP Routing Protocols, TLS and HTTP respectively [9]. Such variants are making constrained IoT devices capable of using IPv6 and creating a smooth communication process between IoT and Internet domains.…”
Section: Comparison Between Internet and Iotmentioning
confidence: 99%
“…In this paper, we reduce the overhead of DTLS for the IoT by employing 6LoWPAN header compression mechanisms. In another work [13], we propose design ideas to reduce the energy consumption of the two-way certificate-based DTLS handshake. We suggest (i) pre-validation of certificates at the trusted 6BR, (ii) session resumption to avoid full rehandshake, and (iii) handshake delegation to the owner of the resource-constrained device.…”
Section: Related Workmentioning
confidence: 99%