Chavan et al., 2016 - Google Patents
Secure and cost-effective application layer protocol with authentication interoperability for IOTChavan et al., 2016
View PDF- Document ID
- 124737743138595856
- Author
- Chavan A
- Nighot M
- Publication year
- Publication venue
- Procedia Computer Science
External Links
Snippet
Internet of Things is future trend that assure to enhance and upgrades our everyday living by utilizing intelligent objects and sensors collectively. These devices are supposed to make use of constrained application protocol (CoAP) to communicate at application layer …
- 238000004891 communication 0 abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0869—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Raza et al. | Lithe: Lightweight secure CoAP for the internet of things | |
Tschofenig et al. | Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things | |
Hummen et al. | Delegation-based authentication and authorization for the IP-based Internet of Things | |
Kothmayr et al. | DTLS based security and two-way authentication for the Internet of Things | |
Chavan et al. | Secure and cost-effective application layer protocol with authentication interoperability for IOT | |
Rahman et al. | Security analysis of IoT protocols: A focus in CoAP | |
Kothmayr et al. | A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication | |
Kumar et al. | Implementation and analysis of QUIC for MQTT | |
Keoh et al. | Securing the internet of things: A standardization perspective | |
Raza et al. | Secure communication for the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN | |
Raza et al. | SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things | |
Alghamdi et al. | Security analysis of the constrained application protocol in the Internet of Things | |
US9742806B1 (en) | Accessing SSL connection data by a third-party | |
Hummen et al. | Tailoring end-to-end IP security protocols to the Internet of Things | |
US9178706B1 (en) | Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion | |
US8671273B2 (en) | Method of performance-aware security of unicast communication in hybrid satellite networks | |
Sahraoui et al. | Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things | |
Granjal et al. | Application-layer security for the WoT: Extending CoAP to support end-to-end message security for Internet-integrated sensing applications | |
Sahraoui et al. | Compressed and distributed host identity protocol for end-to-end security in the IoT | |
Lerche et al. | Connecting the web with the web of things: lessons learned from implementing a CoAP-HTTP proxy | |
Chavan et al. | Secure CoAP using enhanced DTLS for Internet of things | |
Fossati | RFC 7925: Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things | |
Han et al. | Practical security analysis for the constrained node networks: Focusing on the dtls protocol | |
Schmitt et al. | Two-way authentication for the internet-of-things | |
Kwon et al. | LightCert: On designing a lighter certificate for resource‐limited Internet‐of‐Things devices |