2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346871
|View full text |Cite
|
Sign up to set email alerts
|

Study on impact of adding security in a 6LoWPAN based network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The Device Grader extracts the available battery and memory of the IoT device so an appropriate decision can be made to select an encryption algorithm. For the power trace, the kinetic battery model [15] (KiBaM) was used to calculate the state of battery charge. Its energy-harvesting module reads the data-trace having the harvested energy per minute.…”
Section: Device Gradermentioning
confidence: 99%
See 1 more Smart Citation
“…The Device Grader extracts the available battery and memory of the IoT device so an appropriate decision can be made to select an encryption algorithm. For the power trace, the kinetic battery model [15] (KiBaM) was used to calculate the state of battery charge. Its energy-harvesting module reads the data-trace having the harvested energy per minute.…”
Section: Device Gradermentioning
confidence: 99%
“…In dynamic environments, IoT devices generate data of varying confidentiality levels, therefore, it is not suitable to deploy the same encryption algorithm for different pieces of data which either leads to heavy utilization of resources or compromised security. In this regard, context-aware encryption techniques can play an important role to finalize the encryption algorithm for different confidentiality levels of data generated by the device [15]. Moreover, for the effective utilization of context information, it is essential to present it unambiguously while considering the dynamics of IoT system, the capability of the device, and the confidentiality level of the information.…”
Section: Introductionmentioning
confidence: 99%
“…A performance study of end-to-end security available for 6LoWPAN based networks is presented by Matthias et al [43]. The performance analysis covered battery consumption, network latency and memory utilization, while did not measure the impact of information or device classification on the resources.…”
Section: Encryption In 6lowpanmentioning
confidence: 99%
“…This method uses a Secure Service Manager (SSM) protected against spoofing, provides semi end to end security, DoS resilience as DTLS handshakes can be resource intensive and are in this method delegated, and remove single points of failures. In [54], the researchers investigate the impact of including low cost security solutions into the communication scheme on latency, power, and memory management. The security solution they benchmark makes use of AES-CCM which is one of the favourites encryption mechanisms in WSN accordingly to our study, along with RC4 in some cases for its performances and low computational cost.…”
Section: Cryptography-based Defencesmentioning
confidence: 99%