Brachmann et al., 2011 - Google Patents
Security for practical coap applications: Issues and solution approachesBrachmann et al., 2011
View PDF- Document ID
- 5927698374516362094
- Author
- Brachmann M
- Garcia-Morchon O
- Kirsche M
- Publication year
- Publication venue
- Proceedings of the 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN11), Paderborn, Germany
External Links
Snippet
Protocols like 6LoWPAN and CoAP allow for an integration of smart objects into an IP-driven Internet of Things, thus enabling new applications such as pervasive health care or intelligent building control automation. Enabling security services (eg confidentiality …
- 230000036541 health 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
- H04L67/025—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2823—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
- H04L67/2828—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format for reducing the amount or size of exchanged application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/14—Network-specific arrangements or communication protocols supporting networked applications for session management
- H04L67/141—Network-specific arrangements or communication protocols supporting networked applications for session management provided for setup of an application session
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Brachmann et al. | Security for practical coap applications: Issues and solution approaches | |
Rahman et al. | Security analysis of IoT protocols: A focus in CoAP | |
Azzawi et al. | A review on Internet of Things (IoT) in healthcare | |
Shang et al. | Named data networking of things | |
Heer et al. | Security Challenges in the IP-based Internet of Things | |
Granjal et al. | Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey | |
US7941663B2 (en) | Authentication of 6LoWPAN nodes using EAP-GPSK | |
Choi et al. | Secure IoT framework and 2D architecture for End-To-End security | |
Meca et al. | HIP security architecture for the IP-based internet of things | |
KR101688118B1 (en) | Security communication apparatus of internet of things environment and method thereof | |
Riaz et al. | Security analysis survey and framework design for ip connected lowpans | |
Rghioui et al. | Analytical study of security aspects in 6LoWPAN networks | |
Chen et al. | A security gateway application for End-to-End M2M communications | |
Gündoğan et al. | Content object security in the internet of things: challenges, prospects, and emerging solutions | |
Florea et al. | Challenges in security in Internet of Things | |
Han et al. | Practical security analysis for the constrained node networks: Focusing on the dtls protocol | |
Rathod et al. | Security analysis of constrained application protocol (CoAP): IoT protocol | |
Thungon et al. | A survey on 6LoWPAN security for IoT: Taxonomy, architecture, and future directions | |
Protskaya et al. | Broker bridging mechanism for providing anonymity in MQTT | |
Raja et al. | Internet of things: A research-oriented introductory | |
Ambarkar et al. | A comprehensive survey of existing security techniques in the IOT protocol stack | |
Kang et al. | Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments | |
Mali et al. | Security schemes for constrained application protocol in IoT: a precise survey | |
Yedle et al. | A survey: security issues and challenges in internet of things | |
SINGH | SECURE 6LOWPAN NETWORKS FOR E-HEALTHCARE MONITORING APPLICATIONS. |