Abstract

We address the limitations the current solutions for end-to-end security in the context of IoT (Internet of Things) applications. Such limitations are related to a few important aspects that may, in practice, be crucial to support most IoT applications, particularly the lack of support of mobile sensing devices, the inadequacy of many existing sensing devices while supporting authentication and key negotiation with asymmetric cryptography, and the inexistence of more flexible solutions for enabling security at the application layer, as well as the incompatibility of end-to-end security with the usage of proxies. We propose and evaluate experimentally new mechanisms at the transport and application layers which can, we believe, complement the existing approaches. Our experimental evaluation of the proposed mechanisms allows us to verify that effective and flexible end-to-end security is indeed feasible in many usage scenarios, thus being effective alternatives to complement current approaches to IoT end-to-end security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call