[go: up one dir, main page]

Tschofenig et al., 2016 - Google Patents

Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things

Tschofenig et al., 2016

View HTML
Document ID
31287438779699854
Author
Tschofenig H
Fossati T
Publication year

External Links

Snippet

RFC 7925: Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] PROPOSED STANDARD Internet Engineering Task Force (IETF) H. Tschofenig, Ed. Request for Comments …
Continue reading at www.rfc-editor.org (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Tschofenig et al. Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things
Hummen et al. Delegation-based authentication and authorization for the IP-based Internet of Things
US10601594B2 (en) End-to-end service layer authentication
Keoh et al. Securing the internet of things: A standardization perspective
Gurtov Host identity protocol (HIP): towards the secure mobile internet
Dragomir et al. A survey on secure communication protocols for IoT systems
US10097525B2 (en) System, apparatus and method for generating dynamic IPV6 addresses for secure authentication
Kothmayr et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
Granjal et al. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
Pérez et al. Application layer key establishment for end-to-end security in IoT
Fossati RFC 7925: Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things
US20170201382A1 (en) Secure Endpoint Devices
Park et al. Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake
Yu et al. Enabling end-to-end secure communication between wireless sensor networks and the Internet
Rizzardi et al. Analysis on functionalities and security features of Internet of Things related protocols
Park Security architecture for secure multicast coap applications
JP2016526844A (en) Key establishment for constrained resource devices
Sahraoui et al. Compressed and distributed host identity protocol for end-to-end security in the IoT
Kivinen Minimal internet key exchange version 2 (ikev2) initiator implementation
Benslimane et al. Efficient end-to-end secure key management protocol for internet of things
Schmitt et al. Two-way authentication for the internet-of-things
Chavan et al. Secure CoAP using enhanced DTLS for Internet of things
Hanna et al. A comprehensive and realistic performance evaluation of post-quantum security for consumer IoT devices
Gao et al. SecT: A lightweight secure thing-centered IoT communication system
Fuentes-Samaniego et al. An analysis of secure m2m communication in wsns using dtls