Y Ma, L Yan, X Huang, M Ma… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Datagram transport layer security (DTLS) protocol is widely used in Internet of Things (IoT) for providing security services. The computational overhead makes it hard to implement …
M Wang, C Qian, X Li, S Shi… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
Public-key certificate validation is an important building block for various security protocols for IoT devices, such as secure channel establishment, handshaking, and verifying sensing …
S Mishra, VM Phuc, NV Tanh - International Conference on Internet of …, 2022 - Springer
This research has provided an overview of the Internet of Things (IoT) and performed an overall analysis of security protocols and available mechanisms to protect the security of IoT …
C Boudagdigue, A Benslimane… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) network is composed of devices that contain sensitive data, which makes them vulnerable to various security threats. Digital Certificates can be …
P Li, J Su, X Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Enabling end-to-end secure communication is essential for many Internet-of-Things (IoT) application scenarios. Transport-layer security (TLS) and datagram TLS (DTLS) are the de …
J Höglund, M Furuhed, S Raza - Journal of Information Security and …, 2023 - Elsevier
Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly …
H Kurdi, V Thayananthan - Procedia Computer Science, 2021 - Elsevier
With the rapid growth of internet connected devices and the tremendous amount of data that could be generated and exchanged in IoT environment, we need to reconsider in the current …
Allowing a device to verify the digital certificate of another device is an essential requirement and key building block of many security protocols for emerging and future IoT systems that …
H Kwon, J Ahn, JG Ko - Transactions on emerging …, 2019 - Wiley Online Library
Abstract Internet‐of‐Things (IoT) devices are typically resource constrained in terms of computing capabilities and battery power. Despite the efforts from the Internet Engineering …