Performance Analysis of Secure Elements for IoT
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devices need to fulfil similar security requirement...
Main Authors: | Mario Noseda, Lea Zimmerli, Tobias Schläpfer, Andreas Rüst |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-12-01
|
Series: | IoT |
Subjects: | |
Online Access: | https://www.mdpi.com/2624-831X/3/1/1 |
Similar Items
-
Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks
by: Nasr Abosata, et al.
Published: (2022-01-01) -
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
by: Floris Van den Abeele, et al.
Published: (2017-07-01) -
Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol
by: Sultan M. Almeghlef, et al.
Published: (2023-06-01) -
Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols
by: Rikard Hoglund, et al.
Published: (2024-01-01) -
Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities
by: Shancang Li, et al.
Published: (2019-04-01)