2020 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2020
DOI: 10.23919/date48585.2020.9116285
|View full text |Cite
|
Sign up to set email alerts
|

TLS-Level Security for Low Power Industrial IoT Network Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 5 publications
0
5
1
Order By: Relevance
“…The figure shows that the cryptographic calculations of most KEMs account for a very small fraction of the total handshake latency. This observation is contrary to the investigations of conventional handshakes, where it was shown that the (software-based) computation of ECDHE has a significant impact on latency [ 1 ]. In contrast, as shown by the yellow bar, the larger public keys and ciphertexts of the KEMs cause a medium to large increase in handshake latency.…”
Section: Resultscontrasting
confidence: 65%
See 2 more Smart Citations
“…The figure shows that the cryptographic calculations of most KEMs account for a very small fraction of the total handshake latency. This observation is contrary to the investigations of conventional handshakes, where it was shown that the (software-based) computation of ECDHE has a significant impact on latency [ 1 ]. In contrast, as shown by the yellow bar, the larger public keys and ciphertexts of the KEMs cause a medium to large increase in handshake latency.…”
Section: Resultscontrasting
confidence: 65%
“…Secure communication is essential for many IIoT applications, as the data that is exchanged via the internet may contain safety-critical, infrastructural information as well as industrial secrets [ 1 ]. In the vast majority, this security is established through cryptographic protocols such as Transport Layer Security (TLS) and relies on the combination of symmetric cryptography and Public Key Cryptography (PKC).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The types of encryption algorithms employed for the security enhancement of cloud data was discussed along with their drawbacks. Authors in [25][26][27] proposed a scheme for the attainment of security in the low power IoT devices. The main focus was to ensure the transport layer security.…”
Section: Related Workmentioning
confidence: 99%
“…First we present a general summary of security protocols in all layers and later focus on the taxonomies and prior research applying specifically to Physical Layer Security. [7], [8], [9], [10] [11], [12], [13], [14] Network Layer [15], [16], [17] [18], [19] [20], [21], [22] Transport Layer [23], [24], [25], [26] [27], [28], [29], [30] App. Layer [31], [32], [33] [34], [35], [36] Protocol stack security occurs at multiple layers of the OSI models as illustrated in Table I.…”
Section: Introductionmentioning
confidence: 99%