[go: up one dir, main page]

Brachmann et al., 2011 - Google Patents

Security for practical coap applications: Issues and solution approaches

Brachmann et al., 2011

View PDF
Document ID
5927698374516362094
Author
Brachmann M
Garcia-Morchon O
Kirsche M
Publication year
Publication venue
Proceedings of the 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN11), Paderborn, Germany

External Links

Snippet

Protocols like 6LoWPAN and CoAP allow for an integration of smart objects into an IP-driven Internet of Things, thus enabling new applications such as pervasive health care or intelligent building control automation. Enabling security services (eg confidentiality …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • H04L67/025Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
    • H04L67/2828Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format for reducing the amount or size of exchanged application data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/14Network-specific arrangements or communication protocols supporting networked applications for session management
    • H04L67/141Network-specific arrangements or communication protocols supporting networked applications for session management provided for setup of an application session

Similar Documents

Publication Publication Date Title
Brachmann et al. Security for practical coap applications: Issues and solution approaches
Rahman et al. Security analysis of IoT protocols: A focus in CoAP
Azzawi et al. A review on Internet of Things (IoT) in healthcare
Shang et al. Named data networking of things
Heer et al. Security Challenges in the IP-based Internet of Things
Granjal et al. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
US7941663B2 (en) Authentication of 6LoWPAN nodes using EAP-GPSK
Choi et al. Secure IoT framework and 2D architecture for End-To-End security
Meca et al. HIP security architecture for the IP-based internet of things
KR101688118B1 (en) Security communication apparatus of internet of things environment and method thereof
Riaz et al. Security analysis survey and framework design for ip connected lowpans
Rghioui et al. Analytical study of security aspects in 6LoWPAN networks
Chen et al. A security gateway application for End-to-End M2M communications
Gündoğan et al. Content object security in the internet of things: challenges, prospects, and emerging solutions
Florea et al. Challenges in security in Internet of Things
Han et al. Practical security analysis for the constrained node networks: Focusing on the dtls protocol
Rathod et al. Security analysis of constrained application protocol (CoAP): IoT protocol
Thungon et al. A survey on 6LoWPAN security for IoT: Taxonomy, architecture, and future directions
Protskaya et al. Broker bridging mechanism for providing anonymity in MQTT
Raja et al. Internet of things: A research-oriented introductory
Ambarkar et al. A comprehensive survey of existing security techniques in the IOT protocol stack
Kang et al. Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments
Mali et al. Security schemes for constrained application protocol in IoT: a precise survey
Yedle et al. A survey: security issues and challenges in internet of things
SINGH SECURE 6LOWPAN NETWORKS FOR E-HEALTHCARE MONITORING APPLICATIONS.