In particular, the analysis focuses on Transport Layer Security (DTLS, TLS) and recent standardization work on end-to-end application layer security (OSCORE, EDHOC). The message reliability capabilities of each protocol have also been considered in the analysis. The scope of the evaluation has been defined in terms of latency and throughput consumption.
Based on our evaluation, IoT adopters can adequately select the best IoT security communication protocol for their IoT applications.
Full abstract in IEEEXplore DOI: 10.1109/CCNC49032.2021.9369565
Authors:
Zakaria Laaroussi, Oscar Novo - Ericsson Research
Presented at the IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), 9-12 Jan, 2021. Winner of Best paper runner-up award.
©2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse.