Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
DOI: 10.1145/2462096.2462117
|View full text |Cite
|
Sign up to set email alerts
|

Securing the IP-based internet of things with HIP and DTLS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(33 citation statements)
references
References 5 publications
0
33
0
Order By: Relevance
“…HIP introduces a cryptographic namespace of stable host identities (HIs) between the network and transport layer [23]. Unlike DTLS and minimal IKEv2, HIP supports node mobility and multi-homing, which are very important attributes of IoT [24]. Following is a concise overview of HIP BEX and HIP DEX protocols and other lightweight HIP variants.…”
Section: Background and Related Workmentioning
confidence: 99%
“…HIP introduces a cryptographic namespace of stable host identities (HIs) between the network and transport layer [23]. Unlike DTLS and minimal IKEv2, HIP supports node mobility and multi-homing, which are very important attributes of IoT [24]. Following is a concise overview of HIP BEX and HIP DEX protocols and other lightweight HIP variants.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Still, implicit certificates do not alleviate the need for public-key cryptography on constrained devices. Garcia-Morchon et al [31] propose a polynomial scheme as a replacement for public-key cryptography in the DTLS handshake. However, similar to the symmetric-key-based DTLS handshake, their approach depends on the secure provisioning of the polynomial shares before a DTLS connection can be established.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned in [7], the code footprint of a DTLS implementation on a constrained device lies around 16 KB of ROM and 4 KB of RAM. Considering the capabilities of class 1 devices mentioned in the previous section, the large RAM footprint is problematic.…”
Section: A Security With Dtlsmentioning
confidence: 99%
“…In this case, a DTLS session has to be setup with every communicating host. Keoh et al [7] have determined the communication overhead for a single-hop network without any packet loss to be an additional 12 messages spanning four extra round trips. These extra messages can be attributed entirely to the complex DTLS handshake.…”
Section: A Security With Dtlsmentioning
confidence: 99%