Overhead (time and energy) management is paramount for IoT edge devices considering their typically resource-constrained nature. In this thesis we present two contributions for lowering resource consumption of IoT devices. The first contribution is minimizing the overhead of the Transport Layer Security (TLS) authentication protocol in the context of IoT networks by selecting a lightweight cipher suite configuration. TLS is the de facto authentication protocol for secure communication in Internet of Things (IoT) applications. However, the processing and energy demands of this protocol are the two essential parameters that must be taken into account with respect to the resource-constraint nature of IoT devices. For the first contribution, we...
Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our every...
The IoT or Internet of Things is defined by, for example, the Internet Engineering Task Force (IETF)...
Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT...
Security of resource-constrained edge devices, such as Internet of Thing (IoT) devices, is one of th...
[Abstract] Fog computing extends cloud computing to the edge of a network enabling new Internet of T...
The Internet of Things (IoT) has increased communication on the internet immensely ever since it bec...
To support emerging applications such as autonomous vehicles and smart homes and to build an intelli...
In the paradigm of Internet-of-Things (IoT), smart devices will proliferate our living and working s...
More and more devices will be connected to the internet [3]. Many devicesare part of the so-called I...
[Abstract] Modern Internet of Things (IoT) systems have to be able to provide high-security levels, ...
Addressing the security concerns of constrained Internet of Things (IoT) devices, such as client- si...
In this paper, we investigate a key problem of Internet of Things (IoT) applications in practice. Ou...
The Internet of Things (IoT) or IP-connected IoT has become an emerging technology that connects an ...
[Abstract] The latest Internet of Things (IoT) edge-centric architectures allow for unburdening high...
open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with...
Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our every...
The IoT or Internet of Things is defined by, for example, the Internet Engineering Task Force (IETF)...
Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT...
Security of resource-constrained edge devices, such as Internet of Thing (IoT) devices, is one of th...
[Abstract] Fog computing extends cloud computing to the edge of a network enabling new Internet of T...
The Internet of Things (IoT) has increased communication on the internet immensely ever since it bec...
To support emerging applications such as autonomous vehicles and smart homes and to build an intelli...
In the paradigm of Internet-of-Things (IoT), smart devices will proliferate our living and working s...
More and more devices will be connected to the internet [3]. Many devicesare part of the so-called I...
[Abstract] Modern Internet of Things (IoT) systems have to be able to provide high-security levels, ...
Addressing the security concerns of constrained Internet of Things (IoT) devices, such as client- si...
In this paper, we investigate a key problem of Internet of Things (IoT) applications in practice. Ou...
The Internet of Things (IoT) or IP-connected IoT has become an emerging technology that connects an ...
[Abstract] The latest Internet of Things (IoT) edge-centric architectures allow for unburdening high...
open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with...
Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our every...
The IoT or Internet of Things is defined by, for example, the Internet Engineering Task Force (IETF)...
Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT...