Publication:
TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications

dc.affiliation.dptoUC3M. Departamento de Ingeniería Telemáticaes
dc.affiliation.grupoinvUC3M. Grupo de Investigación: Aplicaciones y Servicios Telemáticos (GAST)es
dc.contributor.authorDíaz Sánchez, Daniel
dc.contributor.authorMarín López, Andrés
dc.contributor.authorAlmenares Mendoza, Florina
dc.contributor.authorArias Cabarcos, Patricia
dc.contributor.authorSherratt, R. Simon
dc.contributor.funderComunidad de Madrides
dc.contributor.funderMinisterio de Economía y Competitividad (España)es
dc.date.accessioned2023-05-10T11:26:02Z
dc.date.available2023-05-10T11:26:02Z
dc.date.issued2019-11
dc.descriptionArtículo de acceso abierto (OA). En la plataforma consta como OA, pero el fichero del artículo tiene, erróneamente, copyright de IEEE.es
dc.description.abstractTransport layer security (TLS) is becoming the de facto standard to provide end-to-end security in the current Internet. IoT and M2M scenarios are not an exception since TLS is also being adopted there. The ability of TLS for negotiating any security parameter, its flexibility and extensibility are responsible for its wide adoption but also for several attacks. Moreover, as it relies on public key infrastructure (PKI) for authentication, it is also affected by PKI problems. Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential problems that should be addressed.en
dc.description.sponsorshipThis work was supported in part by Project MAGOS under Grant TEC2017-84197-C4-1-R, in part by Project INRISCO under Grant TEC2014-54335-C4-2-R, and in part by the Comunidad de Madrid (Spain) through the Project CYNAMON cofinanced by European Structural Funds (ESF and FEDER) and the Alexander von Humboldt Post-Doctoral Program under Grant P2018/TCS-4566.en
dc.format.extent30es
dc.identifier.bibliographicCitationDíaz-Sánchez, Daniel, et al. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications. In: IEEE Communications Surveys & Tutorials 21(4), Nov. 2019, Pp. 3502-3531en
dc.identifier.doihttps://doi.org/10.1109/COMST.2019.2914453
dc.identifier.issn1553-877X
dc.identifier.publicationfirstpage3502es
dc.identifier.publicationissue4es
dc.identifier.publicationlastpage3531es
dc.identifier.publicationtitleIEEE Communications Surveys and Tutorials (IEEE Communications Surveys and Tutorials)en
dc.identifier.publicationvolume21es
dc.identifier.urihttps://hdl.handle.net/10016/37270
dc.identifier.uxxiAR/0000026224
dc.language.isoenges
dc.publisherIEEEen
dc.relation.projectIDGobierno de España. TEC2017-84197-C4-1-R/MAGOSes
dc.relation.projectIDGobierno de España. TEC2014-54335-C4-2-R/INRISCOes
dc.rightsOpen access. IEEE is not the copyright holder of this materialen
dc.rights.accessRightsopen accesses
dc.subject.ecienciaTelecomunicacioneses
dc.subject.otherTransport layer securityen
dc.subject.otherDTLSen
dc.subject.otherPublic key infrastructureen
dc.subject.otherTrusted third partyen
dc.subject.otherCertificate pinningen
dc.subject.otherInternet of thingsen
dc.subject.otherMachine to machineen
dc.titleTLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communicationsen
dc.typeresearch article*
dc.type.hasVersionVoR*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
tls_CST_2019.pdf
Size:
6.28 MB
Format:
Adobe Portable Document Format
Description: