@techreport{liu-core-coap-delay-attacks-01, number = {draft-liu-core-coap-delay-attacks-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-liu-core-coap-delay-attacks/01/}, author = {Yan Liu and Jintao Zhu}, title = {{Mitigating delay attacks on Constrained Application Protocol}}, pagetotal = 11, year = 2017, month = oct, day = 30, abstract = {Various attacks including delay attack have become a topic in the security of Internet of Things (IoT), especially for the constrained nodes utilizing sensors and actuators which connect and interact with the physical world. {[}I-D.mattsson-core-coap-actuators{]} describes several serious delay attacks, discusses tougher requirements and then recommends mechanisms to mitigate the attacks. It also specifies some disadvantages with the mechanisms. This document proposes alternative mechanisms to address some of the disadvantages}, }