Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library

被引:4
|
作者
Tsai, Wen-Chung [1 ]
Tsai, Tzu-Hsuan [1 ]
Wang, Te-Jen [2 ]
Chiang, Mao-Lun [3 ]
机构
[1] Chaoyang Univ Technol, Dept Informat & Commun Engn, Taichung 413310, Taiwan
[2] Inst Informat Ind, Smart Syst Inst, Taipei 10622, Taiwan
[3] Natl Taichung Univ Sci & Technol, Bachelor Degree Program Artificial Intelligence, Taichung 40401, Taiwan
关键词
Internet of Things; information security; machine to machine; constrained application protocol; QUANTUM; ACCESS;
D O I
10.3390/s22010340
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated the need for a network infrastructure that provides timely and safe information exchange services. A shortcoming of many existing networks is the use of static key authentication. To enable the use of automatic key update mechanisms in IoT devices and enhance security in lightweight machine-to-machine (M2M) communications, we propose a key update mechanism, namely, double OTP (D-OTP), which combines both one-time password (OTP) and one-time pad to achieve an IoT ecosystem with theoretically unbreakable security. The proposed D-OTP was implemented into the Constrained Application Protocol (CoAP) through the commonly used libcoap library. The experimental results revealed that an additional 8.93% latency overhead was required to obtain an unbreakable guarantee of data transfers in 100 CoAP communication sessions.
引用
收藏
页数:20
相关论文
共 13 条
  • [1] A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
    Esfahani, Alireza
    Mantas, Georgios
    Matischek, Rainer
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    Bicaku, Ani
    Maksuti, Silia
    Tauber, Markus G.
    Schmittner, Christoph
    Bastos, Joaquim
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 288 - 296
  • [2] Implementing Security and Trust in IoT/M2M using Middleware
    Castilho, Sergio D.
    Godoy, Eduardo P.
    Salmen, Fadir
    [J]. 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 726 - 731
  • [3] IoT Based Comprehensive Autonomous Home Automation and Security System Using M2M Communication
    Ejigu, Mesele W.
    Santhosh, Jayagopalan
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (07) : 2234 - 2246
  • [4] Application-Layer Security Mechanism for M2M communication over SMS
    Gligoric, Nenad
    Dimcic, Tomislav
    Drajic, Dejan
    Krco, Srdjan
    Chu, Nhon
    [J]. 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 5 - 8
  • [5] Security threats in M2M networks: A survey with case study
    Hussain, Fatima
    Ferdouse, Lilatul
    Anpalagan, Alagan
    Karim, Lutful
    Woungang, Isaac
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 32 (02): : 117 - 135
  • [6] Secured SECS/GEM: A Security Mechanism for M2M Communication in Industry 4.0 Ecosystem
    Jaisan, Ashish
    Manickam, Selvakumar
    Laghari, Shams A.
    Ul Rehman, Shafiq
    Karuppayah, Shankar
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (08) : 241 - 250
  • [7] Blockchain-Based IoT Application Using Smart Contracts: Case Study of M2M Autonomous Trading
    Gong, Xinglin
    Liu, Erwu
    Wang, Rui
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 781 - 785
  • [8] GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication
    Modiri, Mohammad Mahdi
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 275 - 280
  • [9] Comparative Study of LPWAN Technologies on Unlicensed Bands for M2M Communication in the IoT: beyond LoRa and LoRaWAN
    Queralta, J. Pena
    Gia, T. N.
    Zou, Z.
    Tenhunen, H.
    Westerlund, T.
    [J]. 16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 343 - 350
  • [10] Embedded security framework for M2M communication using ULBC and Rubik's Cube encryption algorithm
    Salunke, Mahendra Balkrishna
    Mahalle, Parikshit Narendra
    Shinde, Gitanjali Rahul
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 793 - 806