Nothing Special   »   [go: up one dir, main page]

Chavan et al., 2016 - Google Patents

Secure and cost-effective application layer protocol with authentication interoperability for IOT

Chavan et al., 2016

View PDF
Document ID
124737743138595856
Author
Chavan A
Nighot M
Publication year
Publication venue
Procedia Computer Science

External Links

Snippet

Internet of Things is future trend that assure to enhance and upgrades our everyday living by utilizing intelligent objects and sensors collectively. These devices are supposed to make use of constrained application protocol (CoAP) to communicate at application layer …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0869Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management

Similar Documents

Publication Publication Date Title
Raza et al. Lithe: Lightweight secure CoAP for the internet of things
Tschofenig et al. Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things
Hummen et al. Delegation-based authentication and authorization for the IP-based Internet of Things
Kothmayr et al. DTLS based security and two-way authentication for the Internet of Things
Chavan et al. Secure and cost-effective application layer protocol with authentication interoperability for IOT
Rahman et al. Security analysis of IoT protocols: A focus in CoAP
Kothmayr et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
Kumar et al. Implementation and analysis of QUIC for MQTT
Keoh et al. Securing the internet of things: A standardization perspective
Raza et al. Secure communication for the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN
Raza et al. SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
Alghamdi et al. Security analysis of the constrained application protocol in the Internet of Things
US9742806B1 (en) Accessing SSL connection data by a third-party
Hummen et al. Tailoring end-to-end IP security protocols to the Internet of Things
US9178706B1 (en) Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US8671273B2 (en) Method of performance-aware security of unicast communication in hybrid satellite networks
Sahraoui et al. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
Granjal et al. Application-layer security for the WoT: Extending CoAP to support end-to-end message security for Internet-integrated sensing applications
Sahraoui et al. Compressed and distributed host identity protocol for end-to-end security in the IoT
Lerche et al. Connecting the web with the web of things: lessons learned from implementing a CoAP-HTTP proxy
Chavan et al. Secure CoAP using enhanced DTLS for Internet of things
Fossati RFC 7925: Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things
Han et al. Practical security analysis for the constrained node networks: Focusing on the dtls protocol
Schmitt et al. Two-way authentication for the internet-of-things
Kwon et al. LightCert: On designing a lighter certificate for resource‐limited Internet‐of‐Things devices