2020
DOI: 10.1109/jiot.2019.2959428
|View full text |Cite
|
Sign up to set email alerts
|

Application Layer Key Establishment for End-to-End Security in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 38 publications
0
21
0
Order By: Relevance
“…• End-to-end security: The protection of transmitted data between devices in an IoT environment to prevent interceptions or alteration to achieve end-to-end protection is very important for IoT devices and their users. [49][50][51][52] The heterogeneity of the environment accounts for the differences in the ability and capability of devices; protocol sets, communication methods, and standards deployed in the environment. The provision of End-to-End security within the environment requires mechanisms that fit the variation of devices capabilities, communication technologies in the IoT environments.…”
Section: Security Challenges In Iot Environmentmentioning
confidence: 99%
“…• End-to-end security: The protection of transmitted data between devices in an IoT environment to prevent interceptions or alteration to achieve end-to-end protection is very important for IoT devices and their users. [49][50][51][52] The heterogeneity of the environment accounts for the differences in the ability and capability of devices; protocol sets, communication methods, and standards deployed in the environment. The provision of End-to-End security within the environment requires mechanisms that fit the variation of devices capabilities, communication technologies in the IoT environments.…”
Section: Security Challenges In Iot Environmentmentioning
confidence: 99%
“…Topic 12 includes studies on transport protocols for endto-end security [288][289][290]. To achieve end-to-end secure communication between an IoT back end and resourcelimited smart things, various studies on communication protocols such as DTLS and CoAP [291,292] and key setting protocols such as EDHOC have been conducted [293,294].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Therefore, there is a need to evaluate lightweight authentication mechanisms for obtaining the MUD URL considering the heterogeneity and constraints of the underlying network technologies. For this purpose, the use of emerging alternative application-level protocols, such as the Ephemeral Diffie-Hellman Over Cose (EDHOC) [125], [126] and Object Security for Constrained RESTful Environments (OSCORE) need to be explored in the deployment of the MUD standard. These technologies have been specifically designed for resource-constrained environments by using lightweight representation formats (i.e., Concise Binary Object Representation (CBOR) [127]) and could mitigate performance issues of existing mechanisms for obtaining MUD files.…”
Section: E Lightweight Authentication For Mud Files Obtainingmentioning
confidence: 99%