Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014 2014
DOI: 10.1109/wowmom.2014.6918975
|View full text |Cite
|
Sign up to set email alerts
|

OSCAR: Object security architecture for the Internet of Things

Abstract: Abstract-Billions of smart, but constrained objects wirelessly connected to the global network require novel paradigms in network design. New protocol standards, tailored to constrained devices, have been designed taking into account requirements such as asynchronous application traffic, need for caching, and group communication. The existing connection-oriented security architecture is not able to keep up-first, in terms of the supported features, but also in terms of the scale and resulting latency on small … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(46 citation statements)
references
References 29 publications
0
45
0
1
Order By: Relevance
“…An interesting approach for confidentiality-protecting data from a constrained device relieves the device completely from authorization decisions by using an out of band mechanism to hand out decryption keys only to authorized recipients [16]. If integrity protection is also desired, this approach requires a public key operation per update (on the source) and per access (on the receiver), which may be too expensive for constrained devices.…”
Section: Related Workmentioning
confidence: 99%
“…An interesting approach for confidentiality-protecting data from a constrained device relieves the device completely from authorization decisions by using an out of band mechanism to hand out decryption keys only to authorized recipients [16]. If integrity protection is also desired, this approach requires a public key operation per update (on the source) and per access (on the receiver), which may be too expensive for constrained devices.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication and key establishment solutions for IoT have been investigated in papers such as [13], [14] and [15]. Hummen et al [16] deal with the constraints of IoT objects and processing the certificate-based DTLS handshakes.…”
Section: Overview Of Secure Communication Authentication and Key Estmentioning
confidence: 99%
“…Nevertheless, the solution is based on Certificate Authority (CA) and authentication takes more than 8 s on TelosB sensor nodes. Vucinic et al [14] present an object-based security architecture solution that provides confidentiality and authenticity in IoT. The solution called OSCAR is based on Elliptic curve cryptography public key operations (ECDSA signatures) and AES in the Counter with CBC-MAC mode (AES-CCM).…”
Section: Overview Of Secure Communication Authentication and Key Estmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, satisfying security requirements such as data authenticity, data confidentiality and access control are essentials in IoT-based systems (Sicari et al 2015). In this regard, various models or schemes have been introduced to ensure security in the IoTbased systems; e.g., Vucinic et al (2015) propose a model (OSCAR) for end-to-end security in the IoT systems, Moosavi et al (2016) also present an end-to-end security scheme for mobility enabled healthcare IoT systems and Neisse et al (2015) offer a model to provide security for data protection in IoT systems.…”
Section: Iot-based System Architecturementioning
confidence: 99%