DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, Jiyong | ko |
dc.contributor.author | Ha, Minkeun | ko |
dc.contributor.author | Kim, Daeyoung | ko |
dc.date.accessioned | 2016-07-12T05:31:53Z | - |
dc.date.available | 2016-07-12T05:31:53Z | - |
dc.date.created | 2016-01-06 | - |
dc.date.created | 2016-01-06 | - |
dc.date.created | 2016-01-06 | - |
dc.date.issued | 2015-10-26 | - |
dc.identifier.citation | The 5th International Conference on Internet of Things (IoT 2015) | - |
dc.identifier.uri | http://hdl.handle.net/10203/210515 | - |
dc.description.abstract | With the explosive popularity of the Internet of Things (IoT) which enables the global connectivity of surrounding objects, the importance of security and privacy is getting more recognized recently. Unlike traditional network entities, devices in IoT normally have constrained resources, which makes it hard to provide full-featured security. To provide a secure channel between Constrained Nodes (CN), Datagram Transport Layer Security (DTLS) is currently used as the de facto security protocol to secure application messages. This paper introduces the practical analysis of DTLS focusing on the Constrained-Node Networks (CNN). We have investigated security considerations for CNN and analyzed the performance of DTLS with a real implementation on an IoT connectivity platform named SNAIL (Sensor Networks for an All-IP World). For a more practical approach, we have additionally implemented the Lightweight Machine to Machine (LwM2M) protocol on SNAIL and evaluated the security functionalities’ network performance. Our various evaluations have shown the impact of embedded cryptography, multi-hop topology, link-layer quality and other constraints. This research would give a comprehensive guidance to whom that wants to provide secure services efficiently to their potential users. | - |
dc.language | English | - |
dc.publisher | The 5th International Conference on Internet of Things (IoT 2015) | - |
dc.title | Practical Security Analysis for the Constrained Node Networks: Focusing on the DTLS Protocol | - |
dc.type | Conference | - |
dc.identifier.wosid | 000380432100003 | - |
dc.identifier.scopusid | 2-s2.0-84962234596 | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | The 5th International Conference on Internet of Things (IoT 2015) | - |
dc.identifier.conferencecountry | KO | - |
dc.identifier.conferencelocation | COEX, Seoul | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Daeyoung | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.