2016
DOI: 10.17487/rfc7925
|View full text |Cite
|
Sign up to set email alerts
|

Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(16 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…Although the design of bullet-proof authentication mechanisms is always desirable, it generally implies high computational cost and/or trusted entities, a prerequisite that may be not applicable to several scenarios. For this reason, the Internet Engineering Task Force (IETF) has developed the Constrained Application Protocol (CoAP) [55], a lightweight scheme specifically tailored for energy-and resource-constrained IoT applications that relies on a dedicated security layer. This security layer, namely Datagram Transport Layer Security (DTLS), is built on top of the UDP protocol and provides IoT devices with several security features, together with a reliable authentication framework [56].…”
Section: A Iot Device Identification and Authenticationmentioning
confidence: 99%
“…Although the design of bullet-proof authentication mechanisms is always desirable, it generally implies high computational cost and/or trusted entities, a prerequisite that may be not applicable to several scenarios. For this reason, the Internet Engineering Task Force (IETF) has developed the Constrained Application Protocol (CoAP) [55], a lightweight scheme specifically tailored for energy-and resource-constrained IoT applications that relies on a dedicated security layer. This security layer, namely Datagram Transport Layer Security (DTLS), is built on top of the UDP protocol and provides IoT devices with several security features, together with a reliable authentication framework [56].…”
Section: A Iot Device Identification and Authenticationmentioning
confidence: 99%
“…Consequently, techniques such as certificate pinning [16], should also be employed to authenticate the devices on the grid. This ensures that each device checks the servers certificate against a known copy stored in its firmware [11]. However, although this is an efficient way of preventing MITM attacks it is not completely immune, as an adversary could disable the certificate pinning procedure, and manage to intercept the communication [31].…”
Section: Security Concerns Of Cloud Based Energy Management System -Lmentioning
confidence: 99%
“…Therefore, a more secure and effective low-power consumption scheme is required, which is acceptable under the benchmarks of the existing standard. On the other hand, in the LoRaWAN network, it can be considered to apply Datagram Transport Layer Security (DTLS) [ 45 ] to provide the end-to-end security between each device and its application server. However, the DTLS handshake procedure results in excessive message signaling and computation overheads, which are not clearly suited for the LoRaWAN network.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed protocol is formally analyzed for its security through Burrows–Abadi–Needham (BAN) logic [ 46 ] and the Automated Validation of Internet Security Protocols and Applications (AVSIPA) tool [ 47 ]. Further, the performance analysis is presented in comparison with the DTLS’s two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), along with a case study on a smart factory-enabled parking system [ 45 , 48 ]. In the case study, the proposed protocol is analyzed for its performance by securing communication between the end devices (sensors) at the parking lot and the application server, which is hosted by the smart factory, as shown in Figure 1 .…”
Section: Introductionmentioning
confidence: 99%