2019
DOI: 10.1109/access.2019.2900939
|View full text |Cite
|
Sign up to set email alerts
|

IoTsafe, Decoupling Security From Applications for a Safer IoT

Abstract: The use of robust security solutions is a must for the Internet of Things (IoT) devices and their applications: regulators in different countries are creating frameworks for certifying those devices with an acceptable security level. However, even for already certified devices, security protocols have to be updated when a breach is found or a certain version becomes obsolete. Many approaches for securing IoT applications are nowadays based on the integration of a security layer [e.g., using transport layer sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…The results obtained in the test series are aligned with the results of other works that have evaluated the performance of SSH embodiments as proxies in real IoT devices (raspberries). Those tests considered real 802.15.4 interfaces and different types of traffic (HTTP, HTTP/2 CoAP) [17] [60]. The computation requirements and overall performance improved in proxied communications.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The results obtained in the test series are aligned with the results of other works that have evaluated the performance of SSH embodiments as proxies in real IoT devices (raspberries). Those tests considered real 802.15.4 interfaces and different types of traffic (HTTP, HTTP/2 CoAP) [17] [60]. The computation requirements and overall performance improved in proxied communications.…”
Section: Discussionmentioning
confidence: 99%
“…Optimized SSH embodiments such as WolfSSH for constrained IoT devices can reduce ROM footprint to 35kb of ROM [53]. RAM consumption also depends heavily on the SSH embodiments, ranging between 2 and 7 MB for standard client versions (compiled with all default features) [17]. Nevertheless, optimized SSH clients only require between 1.4 KB and 2 KB of RAM plus the configurable receive buffer [53].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…MQTT protocol is termed as the transportation of MQ Telemetry. This MQTT is designed and developed as the lightweight and straight forward messaging protocol for subscribing and publishing messages shared with high latency, low bandwidth, restricted devices and unreliable networks [49]. The design principles of MQTT mainly targets on minimizing the processing, the requirements of device resources, and network bandwidth, that tries to guarantee delivery and attain reliability.…”
Section: Standard Protocols Of the Iot Architecturementioning
confidence: 99%