Logo des Repositoriums
 

Application Layer Security for the IoT

dc.contributor.authorBuschsieweke, Marian
dc.contributor.authorGüneş, Mesut
dc.contributor.editorReussner, Ralf H.
dc.contributor.editorKoziolek, Anne
dc.contributor.editorHeinrich, Robert
dc.date.accessioned2021-01-27T13:33:16Z
dc.date.available2021-01-27T13:33:16Z
dc.date.issued2021
dc.description.abstractSecurity for the mostly constrained devices forming the IoT is an active field of research. In this paper, we propose two CoAP Options, HMAC1/HMAC2 and Crypt1/Crypt2 complementing our previous work on Lightweight Capability Based Access Control (LCap). This results in a lightweight, flexible, and complete solution for application layer security for CoAP nodes with severely limited memory. In our evaluation, we show that a pure software implementation without cryptographic hardware acceleration is feasible for practical use on highly constrained IoT devices. Due to mostly idiomatic use of cryptography, existing security analyses apply to our proposal. Our security framework was designed with ample focus on reducing the complexity of the system, which allows lean implementations and simplifies security reviews. This makes LCap based security a good fit for security in the IoT.en
dc.identifier.doi10.18420/inf2020_115
dc.identifier.isbn978-3-88579-701-2
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/34704
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofINFORMATIK 2020
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-307
dc.titleApplication Layer Security for the IoTen
gi.citation.endPage1246
gi.citation.startPage1237
gi.conference.date28. September - 2. Oktober 2020
gi.conference.locationKarlsruhe
gi.conference.sessiontitleWorkshop on Tools and Concepts for Communication and Networked Systems

Dateien

Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
C25-6.pdf
Größe:
330.2 KB
Format:
Adobe Portable Document Format