A guideline on pseudorandom number generation (PRNG) in the IoT

P Kietzmann, TC Schmidt, M Wählisch - ACM Computing Surveys …, 2021 - dl.acm.org
Random numbers are an essential input to many functions on the Internet of Things (IoT).
Common use cases of randomness range from low-level packet transmission to advanced …

EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis

EL Perez, G Selander, JP Mattsson, T Watteyne… - Computer, 2024 - ieeexplore.ieee.org
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis Page 1
COMPUTER 0018-9162/24©2024IEEE PUBLISHED BY THE IEEE COMPUTER SOCIETY …

Make-it—A lightweight mutual authentication and key exchange protocol for industrial internet of things

K Choudhary, GS Gaba, I Butun, P Kumar - Sensors, 2020 - mdpi.com
Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous
opportunities for the engineers to enhance the efficiency of the machines. Despite the …

Content object security in the internet of things: challenges, prospects, and emerging solutions

C Gündoğan, C Amsüss, TC Schmidt… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Content objects are confined data elements that carry meaningful information. Massive
amounts of content objects are published and exchanged every day on the Internet. The …

IoT content object security with OSCORE and NDN: A first experimental comparison

C Gündoğan, C Amsüss, TC Schmidt… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by
low power lossy links and gateways that perform protocol translations. Protocols such as …

Lightweight authenticated key exchange with EDHOC

M Vučinić, G Selander, JP Mattsson, T Watteyne - Computer, 2022 - ieeexplore.ieee.org
Lightweight Authenticated Key Exchange With EDHOC Page 1 SECTION TITLE 94
COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/22©2022IEEE …

Secure onboarding and key management in federated iot environments

K Kanciak, K Wrona, M Jarosz - 2022 17th Conference on …, 2022 - ieeexplore.ieee.org
Many high-impact Internet of Things (IoT) scenarios, such as humanitarian assistance and
disaster relief, public safety, and military operations, require the establishment of a secure …

Information-centric Networking for the Constrained Internet of Things

C Gündoğan - 2022 - refubium.fu-berlin.de
Information-Centric Networking (ICN) promises an enhanced reliability for content retrievals
in the Internet of Things (IoT), while reducing link stress and network-related energy …

[CITATION][C] Lightweight Authenticated Key Exchange with EDHOC: Design Overview

M Vucinic, G Selander, JP Mattsson - 2021 - Technical Report hal-03434293