2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) 2016
DOI: 10.1109/aina.2016.82
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 30 publications
0
0
0
Order By: Relevance
“…By reviewing the literature we were able to find research performing security analysis of CoAP, but while Alghamadi et al [2] focus on discussing the issues and limitations of using IPSec or DTLS to secure CoAP at different layers of the protocol stack-by analyzing the security features provided by each of these approaches using the X.805 security standard-, Rahman and Shah [64] present a survey-like research, mostly covering DTLS applicability to CoAP. To the best of our knowledge, there is little to no work on the practical security of this "real IoT" vision, and most of them focus either on cryptographic approaches [65,27,24], or attack scenarios performed by previously compromised CoAP nodes in a constrained network [43]. Since cryptography alone is not enough to protect software, this dissertation focus on understanding and finding out the ways in which a CoAP node could be compromised in the first place.…”
Section: 'Jhvsf*nqmfnfoujohuif8fcbsdijufduvsfxjui)551boeuif$potusbjof...mentioning
confidence: 99%
“…By reviewing the literature we were able to find research performing security analysis of CoAP, but while Alghamadi et al [2] focus on discussing the issues and limitations of using IPSec or DTLS to secure CoAP at different layers of the protocol stack-by analyzing the security features provided by each of these approaches using the X.805 security standard-, Rahman and Shah [64] present a survey-like research, mostly covering DTLS applicability to CoAP. To the best of our knowledge, there is little to no work on the practical security of this "real IoT" vision, and most of them focus either on cryptographic approaches [65,27,24], or attack scenarios performed by previously compromised CoAP nodes in a constrained network [43]. Since cryptography alone is not enough to protect software, this dissertation focus on understanding and finding out the ways in which a CoAP node could be compromised in the first place.…”
Section: 'Jhvsf*nqmfnfoujohuif8fcbsdijufduvsfxjui)551boeuif$potusbjof...mentioning
confidence: 99%