506 Hits in 4.8 sec

IoTVerif: Automatic Verification of SSL/TLS Certificate for IoT Applications

Anyi Liu, Ali Alqazzaz, Hua Ming, Balakrishnan Dharmalingam
2019 IEEE Access  
In this paper, we present IoTVerif, a system that automatically verifies the Secure Socket Layer/Transport Layer Security (SSL/TLS) certificate for IoT applications that utilize broker-based messaging  ...  IoTVerif holds a great promise for reverse-engineering emerging IoT messaging protocols and identifies the vulnerabilities from IoT-related applications.  ...  We thank Khalid Alghamdi for his contribution to the conference version of this manuscript. We thank Richard D. Thomas, Esq. for proofreading of the early draft of this manuscript.  ... 
doi:10.1109/access.2019.2961918 fatcat:472mexpvxbcr7cg2nc6mbeaqnm

Adaptive Energy-Efficient SSL/TLS Method Using Fuzzy Logic for the MQTT-Based Internet of Things

Jin Hee Chung
2016 International Journal Of Engineering And Computer Science  
First of all, the SSL/TLS handshake can incur considerable overhead, representing an intensive task for low-performance devices.  ...  IoT devices use Message Queuing Telemetry Transport, which is a lightweight IoT standard messaging protocol, along with another security protocol.  ...  SSL/TLS communication can represent an intensive task for low-performance and constrained devices, and its lack of energy efficiency can reduce device lifetime.  ... 
doi:10.18535/ijecs/v5i12.04 fatcat:xiwk57am4rfffe3xfwasewwnum

Design and Development of Security Mechanism for IoT Devices

Subhangi Bhadouria
2018 International Journal for Research in Applied Science and Engineering Technology  
Despite the huge diffusion of DTLS, there is a lack of optimized implementations tailored to resource constrained devices.  ...  (CoAP) .The proposed system aims at the implementation of security for authentication and communication of the constrained as well as non-constrained devices in a network.  ...  Chad Brubaker et. al [6] designed, implemented and evaluated the logic for testing of certificate validation in SSL/TLS implementation.  ... 
doi:10.22214/ijraset.2018.4777 fatcat:a5myhp3vtfgslowltkzq4jyuyi

Secure Wireless Embedded Systems Via Component-based Design

Theis Hjorth, Rune Torbensen
2010 2010 IEEE Second International Conference on Social Computing  
The components communicate using the Secure Embedded Exchange Protocol (SEEP), which has been designed for flexible trust establishment so that small, resource-constrained, wireless embedded systems are  ...  Following this method we propose a security framework with a secure communication component for distributed wireless embedded devices.  ...  for his aid in the protocol analysis, and the reviewers for their comments.  ... 
doi:10.1109/socialcom.2010.150 dblp:conf/socialcom/HjorthT10 fatcat:wkhj2uhxnbbbvggxr3jcmh5a4a

A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things

Hokeun Kim, Eunsuk Kang, Edward A. Lee, David Broman
2017 Proceedings of the Second International Conference on Internet-of-Things Design and Implementation - IoTDI '17  
In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction and deployment of an authorization service infrastructure for the IoT.  ...  The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against emerging networks and devices.  ...  This will create scalability problems for resource-constrained devices.  ... 
doi:10.1145/3054977.3054980 dblp:conf/iotdi/KimKLB17 fatcat:4yrg53ibnzbgvha6ugeqgs6cku

TruWalletM: Secure Web Authentication on Mobile Platforms [chapter]

Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy
2011 Lecture Notes in Computer Science  
Mobile phones are increasingly used as general purpose computing devices with permanent Internet connection.  ...  We present the design and implementation proposal (based on Nokia N900 mobile platform) of TruWalletM, a wallet-like password manager and authentication agent towards the protection of login credentials  ...  For secure communication between the device and the remote web server we utilize SSL/TLS protocol. We assume that all cryptographic primitives of SSL/TLS protocol are secure.  ... 
doi:10.1007/978-3-642-25283-9_15 fatcat:ot2gkcvtofdvbisocljxlnbcue

Design and Evaluation of a Distributed Security Framework for the Internet of Things

Kelechi G. Eze, Cajetan M. Akujuobi
2022 Journal of Signal and Information Processing  
The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource  ...  Our reason for choosing the actor model and blockchain is to compare its suitability for IoT integration in parallel.  ...  IoT development, and recommendation for suitable cryptographic algorithms for constrained devices.  ... 
doi:10.4236/jsip.2022.131001 fatcat:pwjt65phyre3vc7lar2xdjkz6u


ganesh E N
In this paper is described communication protocols for IoT devices (Embedded Systems ) and difference between them. Here is described the main features of each of them.  ...  This is Constrained Application Protocol. Like HTTP, CoAP is a document transfer protocol Fig. 3 . Unlike HTTP, CoAP is designed for the needs of devices.  ...  CoAP and RESTfulFor security CoAP is built on top of UDP not TCP, SSL/TLS are not available to provide security.  ... 
doi:10.6084/m9.figshare.20080664.v1 fatcat:uv4whw2tzzeaxalnmjr2yjqq4u

Moving from the design of usable security technologies to the design of useful secure applications

D. K. Smetters, R. E. Grinter
2002 Proceedings of the 2002 workshop on New security paradigms - NSPW '02  
We propose alternate ways of building and integrating security technologies into applications and usability methods for evaluating how successful our prototypes are.  ...  In this paper we argue that improving the usability of security technology is only one part of the problem, and that what is missed is the need to design usable and useful systems that provide security  ...  A notable case in point is the SSL/TLS protocol [12] , as.implemented in a number of easily obtainable, fast, and reliable libraries such as OpenSSL and Sun's standard JavaTMimplementation.  ... 
doi:10.1145/844102.844117 dblp:conf/nspw/SmettersG02 fatcat:fsn66hapfrfypj4kztwxewg7oi

Secure Network Card [chapter]

Michael Montgomery, Asad Ali, Karen Lu
2004 IFIP International Federation for Information Processing  
This paper covers the philosophy and techniques used for implementation of a standard networking stack, including the hardware interface, PPP, TCP, IP, SSL/TLS, HTTP, and applications within the resource  ...  This implementation enables a smart card to establish secure TCP/IP connections using SSL/TLS protocols to any client or server on the Internet, using only standard networking protocols, and requiring  ...  Since I/O buffers pose heavy RAM requirements, it is even more critical to have an optimized design for resource-constrained devices like smart cards.  ... 
doi:10.1007/1-4020-8147-2_13 fatcat:chdcosw2cfdpdkzol7dxizcgqq

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Shruthi Narayanaswamy, Anitha Vijaya Kumar
2019 Advances in Science, Technology and Engineering Systems  
of communicating devices.  ...  Even though many secure classic layered security mechanisms are available for implementation, they cannot be applied on IoT devices because of the huge energy that they consume.  ...  A matter of concern is that SSL/TLS is quite expensive to be used for a constrained IoT environment.  ... 
doi:10.25046/aj040131 fatcat:jibfkxftcvhx3cjpyo6hd23dii

A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements

Hlabishi I. Kobo, Adnan M. Abu-Mahfouz, Gerhard P. Hancke
2017 IEEE Access  
A wireless sensor network (WSN) is a great platform for low-rate wireless personal area networks with little resources and short communication ranges.  ...  Moreover, it delves into some of the challenges facing this paradigm, as well as the major SDWSN design requirements that need to be considered to address these challenges.  ...  However, as [36] maintains the impracticality of running SSL/TLS protocols on small devices, the question of securing network communication remains an interesting research question.  ... 
doi:10.1109/access.2017.2666200 fatcat:ez7r7ej6hnfybiifhebrmupxdu

Design of Secured and Intelligent Architecture for Security in Perceptual Layer of the Internet of Things

V. Kamalakannan, S. Tamilselvan
2017 Indian Journal of Science and Technology  
Hence it is very difficult for the man in middle to access the information exchanged between the Perceptual Layer devices.  ...  A highly efficient architectures for asymmetric key encryption is applied with symmetric key encryption for encrypting the data transmitted between the devices present in the perceptual layers in the IoT  ...  Hence, they might be incapable of supporting the SSL/TLS protocol, which is the industry-standard transport protection mechanism.  ... 
doi:10.17485/ijst/2017/v10i1/109387 fatcat:6pu224nbljf3lnlw4o3ximpipu

An Experimental Evaluation of Application Layer Protocols for the Internet of Things

Lavinia NĂSTASE, Ionuț Eugen SANDU, Nirvana POPESCU
2017 Studies in Informatics and Control  
The main obstacle that arises is that technology should allow physical objects, usually constrained devices, to interact with applications.  ...  In this context, the application layer protocols play an important part in orchestrating an IoT network.  ...  Since the IoT requires a standard for authentication, MQTT relies on SSL/TLS encryption. The drawback is that SSL/TLS is quite an expensive protocol to use in memory and power constrained devices.  ... 
doi:10.24846/v26i4y201704 fatcat:kbuja7r7cbajnew43bmxyq7jci

Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples

Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, Michele Rossi
2012 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)  
In this paper we discuss security procedures for constrained IoT devices.  ...  Moreover, our design does not require any modifications to the protocol stacks of unconstrained nodes.  ...  IPsec, SSL/TLS, DTLS, etc.  ... 
doi:10.1109/wowmom.2012.6263790 dblp:conf/wowmom/BonettoBLOSR12 fatcat:t2khq2vehnchrhgk5dpb7advqy
« Previous Showing results 1 — 15 out of 506 results