2019 16th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2019
DOI: 10.1109/ccnc.2019.8651860
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 6 publications
0
5
0
1
Order By: Relevance
“…The conventional solutions (e.g., hypertext transfer protocol secure-HTTPS) also display poor scaling problems and privacy concerns. Jin et al used DNS with privacy preservation to design a novel lightweight, secure, and remote IoT monitoring system [39]. The remote monitoring utilized the DNS protocol, whereas the communication between IoT devices and gateways still used the conventional protocols, i.e., the constrained application protocol (CoAP) and MQTT.…”
Section: Secure Iot Monitoringmentioning
confidence: 99%
“…The conventional solutions (e.g., hypertext transfer protocol secure-HTTPS) also display poor scaling problems and privacy concerns. Jin et al used DNS with privacy preservation to design a novel lightweight, secure, and remote IoT monitoring system [39]. The remote monitoring utilized the DNS protocol, whereas the communication between IoT devices and gateways still used the conventional protocols, i.e., the constrained application protocol (CoAP) and MQTT.…”
Section: Secure Iot Monitoringmentioning
confidence: 99%
“…After the installation of the gateway and sensors, no cloud service is invoked. Access to the sensors from outside can be executed in different ways: (1) by using port forwarding; (2) by exploiting the Domain Name System (DNS) [28]; (3) by using public Message Queue Telemetry Transport (MQTT) brokers, etc. The owner of the GW is responsible for the overall management and evolution of her/his system.…”
Section: Cloud-based Iot Systemsmentioning
confidence: 99%
“…While some attempts were made to structure (RFC 1464) or discourage (RFC 5507) using TXT records this way, several common applications leverage them. For example, TXT records are used for various forms of email validation and spam prevention, including SPF, DKIM, and DMARC, but DNS TXT records can also be used as a way of finding contacts [4], or to monitor IoT devices [5]. Besides these legitimate use cases, malicious uses include adding large records to create more efficient DNS amplification attacks [6], or creating a command and control channel for malware [7], [8], [9], [10], [11], [12].…”
Section: Background and Related Workmentioning
confidence: 99%