Practical Security Analysis for the Constrained Node Networks: Focusing on the DTLS Protocol

Cited 8 time in webofscience Cited 0 time in scopus
  • Hit : 342
  • Download : 94
DC FieldValueLanguage
dc.contributor.authorHan, Jiyongko
dc.contributor.authorHa, Minkeunko
dc.contributor.authorKim, Daeyoungko
dc.date.accessioned2016-07-12T05:31:53Z-
dc.date.available2016-07-12T05:31:53Z-
dc.date.created2016-01-06-
dc.date.created2016-01-06-
dc.date.created2016-01-06-
dc.date.issued2015-10-26-
dc.identifier.citationThe 5th International Conference on Internet of Things (IoT 2015)-
dc.identifier.urihttp://hdl.handle.net/10203/210515-
dc.description.abstractWith the explosive popularity of the Internet of Things (IoT) which enables the global connectivity of surrounding objects, the importance of security and privacy is getting more recognized recently. Unlike traditional network entities, devices in IoT normally have constrained resources, which makes it hard to provide full-featured security. To provide a secure channel between Constrained Nodes (CN), Datagram Transport Layer Security (DTLS) is currently used as the de facto security protocol to secure application messages. This paper introduces the practical analysis of DTLS focusing on the Constrained-Node Networks (CNN). We have investigated security considerations for CNN and analyzed the performance of DTLS with a real implementation on an IoT connectivity platform named SNAIL (Sensor Networks for an All-IP World). For a more practical approach, we have additionally implemented the Lightweight Machine to Machine (LwM2M) protocol on SNAIL and evaluated the security functionalities’ network performance. Our various evaluations have shown the impact of embedded cryptography, multi-hop topology, link-layer quality and other constraints. This research would give a comprehensive guidance to whom that wants to provide secure services efficiently to their potential users.-
dc.languageEnglish-
dc.publisherThe 5th International Conference on Internet of Things (IoT 2015)-
dc.titlePractical Security Analysis for the Constrained Node Networks: Focusing on the DTLS Protocol-
dc.typeConference-
dc.identifier.wosid000380432100003-
dc.identifier.scopusid2-s2.0-84962234596-
dc.type.rimsCONF-
dc.citation.publicationnameThe 5th International Conference on Internet of Things (IoT 2015)-
dc.identifier.conferencecountryKO-
dc.identifier.conferencelocationCOEX, Seoul-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Daeyoung-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 8 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0