2019
DOI: 10.17487/rfc8613
|View full text |Cite
|
Sign up to set email alerts
|

Object Security for Constrained RESTful Environments (OSCORE)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 99 publications
(73 citation statements)
references
References 1 publication
0
73
0
Order By: Relevance
“…As we stated in the Related Work Section, any access control solution (as OAuth 2.0) must support secure communications, so further investigation and experimentation into encryption or key exchange of devices and gateways is strongly recommended. It might be possible to use a different approach as OSCORE (Object Security for Constrained RESTful Environments) [ 54 ] which allows establishment of end-to-end secure communications. This standard could avoid the need for introducing a gateway as it could considerably reduce resources consumption.…”
Section: Discussionmentioning
confidence: 99%
“…As we stated in the Related Work Section, any access control solution (as OAuth 2.0) must support secure communications, so further investigation and experimentation into encryption or key exchange of devices and gateways is strongly recommended. It might be possible to use a different approach as OSCORE (Object Security for Constrained RESTful Environments) [ 54 ] which allows establishment of end-to-end secure communications. This standard could avoid the need for introducing a gateway as it could considerably reduce resources consumption.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, specific work has been recently done on Datagram TLS (DTLS) for constrained environments [ 54 ], as in fact DTLS is the default security protocol for the Constrained Application Protocol (CoAP), a lightweight application-layer protocol that has been designed for constrained devices and is therefore a good candidate for BLE devices [ 37 ]. Object security is another recent approach being developed for securing application-layer payloads (i.e., end-to-end) [ 55 ], which may be suitable for BLE mesh networks as well. Non-IP-based BLE mesh networks will need to develop end-to-end security functionality that might be equivalent to the approaches described.…”
Section: Discussion and Open Issuesmentioning
confidence: 99%
“…In addition to the IETF, other organizations and alliances such as Open Mobile Alliance (OMA) in their white paper Lightweight M2M 1.1 [15] integrate different technologies including LPWAN and consider new strategies and protocols to provide security, with the incorporation of OSCORE [16], a recent IETF standard, in their protocol stack to provide security at the application layer.…”
Section: Related Workmentioning
confidence: 99%