Securing name resolution in the IoT: DNS over CoAP
In this paper, we present the design, implementation, and analysis of DNS over
CoAP~(DoC), a new proposal for secure and privacy-friendly name resolution of constrained …
CoAP~(DoC), a new proposal for secure and privacy-friendly name resolution of constrained …
[PDF][PDF] A systematic approach to prioritize vulnerabilities in iot deployments
O Alrawi - 2023 - alrawi.io
To my fellow lab mates, Chaz, Gong, Kevin V, Panos, Rosa, Thanos1, Thanos2, Thomas,
Yizheng, and Zane, thank you for your support and camaraderie. A special thanks to Chaz …
Yizheng, and Zane, thank you for your support and camaraderie. A special thanks to Chaz …
[PDF][PDF] YourThings: A Comprehensive Annotated Dataset of Network Traffic from Deployed Home-based IoT Devices
We describe a novel and public dataset for evaluating the security and privacy of home-
based IoT devices known as YourThings 1. The dataset is the result of thousands of …
based IoT devices known as YourThings 1. The dataset is the result of thousands of …
Privacy-preserving communications for IoT based on DNS and its security extensions
I Ayoub - 2024 - theses.hal.science
The Internet of Things (IoT) technologies have transformed how we interact with the world
and machines, becoming an integral part of our daily lives. This thesis aims to address some …
and machines, becoming an integral part of our daily lives. This thesis aims to address some …
[PDF][PDF] Short Abstract: Towards a Better Understanding of IoT Domain Names
I Ayoub, MS Lenders, B Ampeau, S Balakrichenan… - ant.isi.edu
In this short abstract, we present our work-inprogress on studying IoT-related names. Our
work aims for a better understanding of the characteristics of domain names commonly used …
work aims for a better understanding of the characteristics of domain names commonly used …
[PDF][PDF] Integration of OSCORE into RIOT OS
LJ Rosenow - inet.haw-hamburg.de
As the Internet of Things (IoT) landscape is rapidly growing in the pasts years it becomes
more relevant to ensure its robustness in terms of security. This makes it more important then …
more relevant to ensure its robustness in terms of security. This makes it more important then …