World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to …
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for efficiency and scalability reasons. These intermediate proxies break end-to-end security …
C Gündoğan, C Amsüss, TC Schmidt… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Content objects are confined data elements that carry meaningful information. Massive amounts of content objects are published and exchanged every day on the Internet. The …
Internet of Things (IoT) applications bring evolved and intelligent services that can help improve users' daily lives. These applications include home automation, health care, and …
C Gündoğan, C Amsüss, TC Schmidt… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by low power lossy links and gateways that perform protocol translations. Protocols such as …
A Durand, P Gremaud, J Pasquier… - Proceedings of the 9th …, 2019 - dl.acm.org
This paper explores cutting-edge techniques for protecting cryptographic keys in Internet of Things (IoT) systems based on web protocols. In this context, we evaluated the use of …
F Günther, MIT Mukendi - 2023 IEEE 8th European Symposium …, 2023 - ieeexplore.ieee.org
EDHOC is a lightweight authenticated key exchange protocol for IoT communication, currently being standardized by the IETF. Its design is a trimmed-down version of similar …
S Hristozov, M Huber, L Xu, J Fietz, M Liess… - Proceedings of the …, 2021 - dl.acm.org
Many modern IoT applications rely on the Constrained Application Protocol (CoAP). Recently, the Internet Engineering Task Force (IETF) proposed two novel protocols for …