Essays about: "DTLS"

Showing result 1 - 5 of 20 essays containing the word DTLS.

  1. 1. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  2. 2. Protocol-aware fuzzing of DTLS

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Rahbar Ghori; [2021]
    Keywords : ;

    Abstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE

  3. 3. Enhanced DTLS Support for the Contiki-NG OS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rudolfs Arvids Kalnins; Kristaps Karlis Kalnins; [2021]
    Keywords : Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operating Systems; Security; Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operativsystem; Säkerhet;

    Abstract : Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols. READ MORE

  4. 4. Analysis of DTLS Implementations Using State Fuzzing

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Fredrik Tåkvist; [2020]
    Keywords : ;

    Abstract : Despite being unreliable, UDP is the prefered choice for a growing number ofimplementations due to its low latency. Hence, a means for protecting sensitive datasent over UDP is essential. The protocol most commonly used for this purpose is Datagram Transport Layer Security (DTLS). READ MORE

  5. 5. Efficient Security Protocol for RESTful IoT devices

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Karnarjun Kantharajan; Sahar Shirafkan; [2020]
    Keywords : Internet of Things IoT ; TLS 1.2 1.3; DTLS 1.2; OSCORE; CoAP; Security Protocols.; Technology and Engineering;

    Abstract : In this thesis, we presented comparisons with respect to Energy Consumption, bandwidth, the Constraint application protocol (CoAP) transaction time and throughput for four different security protocols. We simulated and implemented the Datagram Transport Layer Protection (DTLS) version 1.2, Transport Layer Protocol (TLS) version 1.2 & 1. READ MORE