This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-20 Creation time: 00-39-32 --- Number of references 3 article 2013-raza-lithe Lithe: Lightweight Secure CoAP for the Internet of Things IEEE Sensors Journal 2013 10 13 10 3711-3720 Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security iotsec en 1530-437X 10.1109/JSEN.2013.2277656 1 ShahidRaza HosseinShafagh KasunHewage RenéHummen ThiemoVoigt inproceedings 2013-wisec-garcia-securing Securing the IP-based Internet of Things with HIP and DTLS 2013 4 119--124 ACM Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper) 978-1-4503-1998-0 10.1145/2462096.2462117 1 OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar PedroMoreno-Sanchez FranciscoVidal-Meca Jan HenrikZiegeldorf inproceedings 2013-pitsac-vidalmeca-hip HIP security architecture for the IP-based Internet of Things 2013 3 25 1331 - 1336 The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low powerWireless Personal Area Networks and Constrained Application Protocol currently in development in IETF. Security and privacy are a must for the IP-based IoTs in order to ensure its acceptance. However, mobility, limited bandwidth, and resource-constrained devices pose new challenges and require for a sound and efficient security architecture. In particular, dynamic association of mobile smart objects and the management of keys in large-scale networks remain an open challenge. In this context, we propose a flexible security architecture based on the Host Identity Protocol and Multimedia Internet KEYing protocols allowing for secure network association and key management. HIP - based on asymmetric-key cryptography - ensures unambiguous thing identification, mobility support, as well as a lightweight and secure method for network association. In our solution, HIP is extended with MIKEY capabilities to provide enhanced key management using polynomials, which allow to generate pairwise keys with any node based on its identity. This combination of protocols and crypto-algorithms ensures both strong security and very good performance as shown by our implementation and presents clear advantages compared with other alternatives. Internet of Things; Security; Network Access; Key Management Online IEEE Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013 Barcelona, Spain 25.-28.03.2013 en 10.1109/WAINA.2013.158 1 FranciscoVidal Meca Jan HenrikZiegeldorf OscarGarcia-Morchon Sandeep S.Kumar Sye LoongKeoh PedroMoreno-Sanchez