Lightweight authenticated key exchange for low-power IoT networks using EDHOC
2025 - Elsevier Internet of Things; Volume 31, May 2025
Energy efficiency is crucial for battery-powered devices in constrained networks, especially in Smart Agriculture and Smart Cities scenarios. To maximize battery life and ensure secure communications, lightweight key exchange protocols like Ephemeral Diffie–Hellman Over COSE (EDHOC) are essential.…
Securing Authentication and Authorization in Computing Continuum
2024 - The 8th International Conference on Mobile Internet Security (MobiSec 2024)
In the era of Computing Continuum, secure and interoperable data sharing across heterogeneous environments is crucial. This research develops innovative cybersecurity components for the computing continuum, integrating the Authentication and Authorization for Constrained Environments (ACE)…
Innovative security and compression for constrained IoT networks
2023 Internet of Things, 24
Low-Power Wide-Area Networks (LPWAN) are a type of wireless communication technologies that enable efficient data transfer between low-power devices. This article explores the challenges of ensuring security in LPWANs and proposes a solution that combines two key mechanisms: Object Security for…