A guideline on pseudorandom number generation (PRNG) in the IoT
Random numbers are an essential input to many functions on the Internet of Things (IoT).
Common use cases of randomness range from low-level packet transmission to advanced …
Common use cases of randomness range from low-level packet transmission to advanced …
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis Page 1
COMPUTER 0018-9162/24©2024IEEE PUBLISHED BY THE IEEE COMPUTER SOCIETY …
COMPUTER 0018-9162/24©2024IEEE PUBLISHED BY THE IEEE COMPUTER SOCIETY …
Make-it—A lightweight mutual authentication and key exchange protocol for industrial internet of things
Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous
opportunities for the engineers to enhance the efficiency of the machines. Despite the …
opportunities for the engineers to enhance the efficiency of the machines. Despite the …
Content object security in the internet of things: challenges, prospects, and emerging solutions
Content objects are confined data elements that carry meaningful information. Massive
amounts of content objects are published and exchanged every day on the Internet. The …
amounts of content objects are published and exchanged every day on the Internet. The …
IoT content object security with OSCORE and NDN: A first experimental comparison
The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by
low power lossy links and gateways that perform protocol translations. Protocols such as …
low power lossy links and gateways that perform protocol translations. Protocols such as …
Lightweight authenticated key exchange with EDHOC
Lightweight Authenticated Key Exchange With EDHOC Page 1 SECTION TITLE 94
COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/22©2022IEEE …
COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/22©2022IEEE …
Secure onboarding and key management in federated iot environments
K Kanciak, K Wrona, M Jarosz - 2022 17th Conference on …, 2022 - ieeexplore.ieee.org
Many high-impact Internet of Things (IoT) scenarios, such as humanitarian assistance and
disaster relief, public safety, and military operations, require the establishment of a secure …
disaster relief, public safety, and military operations, require the establishment of a secure …
Information-centric Networking for the Constrained Internet of Things
C Gündoğan - 2022 - refubium.fu-berlin.de
Information-Centric Networking (ICN) promises an enhanced reliability for content retrievals
in the Internet of Things (IoT), while reducing link stress and network-related energy …
in the Internet of Things (IoT), while reducing link stress and network-related energy …