Analysis of Network Protocols for Secure Communication

被引:0
|
作者
Caballero, David [1 ]
Gonzalez, Francisco [1 ]
Islam, Sheikh Ariful [1 ]
机构
[1] Univ Texas Rio Grande Valley, Dept Comp Sci, Edinburg, TX 78539 USA
关键词
IoT; Security; Network; Protocol; TLS; SSL; HTTPS; IPSec; SSH; TCP/IP;
D O I
10.1109/ISDFS52919.2021.9486356
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the age of constantly evolving technology, network communication has become more critical than ever. Along with this, the need for secure channels for edge communication is undeniable. Two traits of the quality of desirable network protocols are security and reliability. However, these protocols have associated risks. In this work, we provide an in-depth analysis of dominant network protocols on which the new communication protocols (e.g., CoAP, XMPP, AMQP, etc.) of the Internet of Things (IoT) ecosystem heavily relies on.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Secure message propagation protocols for IoVs communication components
    Vasudev, Harsha
    Das, Debasis
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 82
  • [32] Secure and efficient key agreement protocols for wireless communication
    Yang, HK
    An, YH
    Choi, J
    [J]. 2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 520 - 524
  • [33] Formal Analysis of Combinations of Secure Protocols
    Blot, Elliott
    Dreier, Jannik
    Lafourcade, Pascal
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 53 - 67
  • [34] COMPUTER-COMMUNICATION NETWORK PROTOCOLS
    BUTRIMENKO, A
    SEXTON, J
    [J]. AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1978, (06): : 56 - 65
  • [35] Performance Comparison and Analysis of Wireless Communication Network based on MAC Protocols
    Gao, Yining
    Li, Suoping
    Shang, Zihan
    Liu, Yang
    [J]. PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 1899 - 1903
  • [36] Secure communication based on network coding
    Cao, Zhang-Hua
    Tang, Yuan-Sheng
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (8 A): : 188 - 194
  • [37] Quantum Secure Direct Communication Network
    Wang, Shiou-An
    Lu, Chin-Yung
    [J]. 2013 13TH IEEE CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO), 2013, : 752 - 755
  • [38] Secure image communication for network applications
    Lian, Shiguo
    Liu, Zhongxuan
    Wang, Jinwei
    Ren, Zhen
    Wang, Haila
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS, 2006, 6250
  • [39] Implementation of Secure Communication With Modbus and Transport Layer Security protocols
    Ferst, Matheus K.
    de Figueiredo, Hugo F. M.
    Denardin, Gustavo
    Lopes, Juliano
    [J]. 2018 13TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRY APPLICATIONS (INDUSCON), 2018, : 155 - 162
  • [40] Secure protocols for data propagation and group communication in vehicular networks
    Meng-Yen Hsieh
    Hua-Yi Lin
    Chin-Feng Lai
    Kuan-Ching Li
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011