2023 IEEE Symposium on Security and Privacy (SP) 2023
DOI: 10.1109/sp46215.2023.10179369
|View full text |Cite
|
Sign up to set email alerts
|

One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 53 publications
0
2
0
Order By: Relevance
“…Solutions based on the IoT are gradually being introduced across various domains, such as smart cities, intelligent transportation, smart homes, and precision agriculture. [1][2][3][4] The current Internet Protocol (IP)-based network architecture faces numerous challenges in meeting the rapidly growing demands of IoT systems, including issues related to quality of service assurance, address resource exhaustion, and security concerns. Given the finite nature of IP network addresses and the ever-expanding need for content delivery by users, Named Data Networking (NDN) 5 is emerging as the next-generation network paradigm, swiftly addressing this contradiction.…”
Section: Introductionmentioning
confidence: 99%
“…Solutions based on the IoT are gradually being introduced across various domains, such as smart cities, intelligent transportation, smart homes, and precision agriculture. [1][2][3][4] The current Internet Protocol (IP)-based network architecture faces numerous challenges in meeting the rapidly growing demands of IoT systems, including issues related to quality of service assurance, address resource exhaustion, and security concerns. Given the finite nature of IP network addresses and the ever-expanding need for content delivery by users, Named Data Networking (NDN) 5 is emerging as the next-generation network paradigm, swiftly addressing this contradiction.…”
Section: Introductionmentioning
confidence: 99%
“…To ensure the confidentiality and integrity of data exchanged, it is crucial that network devices are able to establish security keys between themselves. These keys are used to safeguard the privacy of user information and prevent various attacks such as protocol manipulation [ 1 ], and guarantee the integrity of the data [ 2 ]. In networks such as LLNs and IoT, however, there are often devices that are computationally too constrained to establish a security key using traditional key distribution mechanisms such as those based on the Diffie-Hellman key exchange.…”
Section: Introductionmentioning
confidence: 99%