2021
DOI: 10.1109/tmc.2020.2967044
|View full text |Cite
|
Sign up to set email alerts
|

IoT and HIP's Opportunistic Mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…The implicit certificatebased mechanism was proposed for low-overhead demands in [19]. In [20], the authors presented sprayed strategies for hardening the better-than-nothing paradigm, minimizing the attack surface and, thus, the likelihood of an attack, with a focus on the opportunistic mode of the HIP in the IoT scene. DTLS [8] is based on the Transport Layer Security (TLS) protocol using the User Datagram Protocol (UDP) for transporting services and provides equivalent security guarantees for end-to-end communication.…”
Section: Key Exchange Protocol For Multihomed Mobile Devicesmentioning
confidence: 99%
“…The implicit certificatebased mechanism was proposed for low-overhead demands in [19]. In [20], the authors presented sprayed strategies for hardening the better-than-nothing paradigm, minimizing the attack surface and, thus, the likelihood of an attack, with a focus on the opportunistic mode of the HIP in the IoT scene. DTLS [8] is based on the Transport Layer Security (TLS) protocol using the User Datagram Protocol (UDP) for transporting services and provides equivalent security guarantees for end-to-end communication.…”
Section: Key Exchange Protocol For Multihomed Mobile Devicesmentioning
confidence: 99%
“…One approach to counter the wireless and attachment vulnerabilities is to assign a cryptographically secure identifier to all IoT devices already before deployment, e.g., at the manufacturing time. If these preconfigured identifiers are then configured at the system side before a device is deployed, already the initial connection between a new device and the rest of the system can be secured [ 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%