End-to-End Message Authentication Using CoAP Over IoT

被引:4
|
作者
Singhal, Prateek [1 ]
Sharma, Puneet [1 ]
Hazela, Bramah [1 ]
机构
[1] Amity Univ, Dept Comp Sci & Engn, Noida, Uttar Pradesh, India
关键词
IoT (Internet of Things); CoAP (Constrained Application Protocol); DTLS; Internet protocol stack; Cooja;
D O I
10.1007/978-981-13-2324-9_28
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet of Things is a new innovative technology topic under a science fiction and imagination or virtual world associated by visualizing physical world. There are conjecture and cybernetic world still possible about it. This is a truly abundant terrain of fantasy and original ideas when the combination of real life and virtual life through IoT. The interconnection of embedded devices, sensors, actuators can communicate the information from one to another (M2M) over Internet and data exchange. The important challenge faced in IoT is security which helps to secure the information through data exchanging, and is known as Web of Things (WoT). Moreover, to perform routing in 6LoWPAN network, RPL uses destination-oriented DAG (DODAG) between the different IPv6 nodes. We can also interface the CoAP and 6LoWPAN through RPL using UDP protocol for various constrained nodes in Contiki OS. In this paper, we focus on the proposed project Constraint Application Protocol (CoAP) that falls under a software component at application layer. The DTLS security based on LESS algorithm is provided under the CoAP protocol and gives the unicast messages because DTLS does not support multicast. The proposed solution to make a multicast message is distributing session key using key distribution centre. This is used to encrypt or decrypt the multicast message and then design and improve the cryptography algorithm. We have implemented this proposed work on the Contiki OS with the framework using Cooja simulator that is an erudite tool to make the work more efficient and optimized it.
引用
收藏
页码:279 / 288
页数:10
相关论文
共 50 条
  • [1] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP
    Buschsieweke, Marian
    Guenes, Mesut
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [2] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [3] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    [J]. 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
  • [4] End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations
    Hammad, Mohamed
    Iliyasu, Abdullah M.
    Elgendy, Ibrahim A.
    Abd El-Latif, Ahmed A.
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [5] A Collaborative PHY-Aided Technique For End-to-End IoT Device Authentication
    Hao, Peng
    Wang, Xianbin
    Shen, Weiming
    [J]. IEEE ACCESS, 2018, 6 : 42279 - 42293
  • [6] A decentralized scalable security framework for end-to-end authentication of future IoT communication
    Sheron, P. S. Febin
    Sridhar, K. P.
    Baskar, S.
    Shakeel, P. Mohamed
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12):
  • [7] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [8] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT
    Li, Cui
    Chen, Rongmao
    Wang, Yi
    Xing, Qianqian
    Wang, Baosheng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4526 - 4542
  • [10] A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT
    Li, Sensen
    Huang, Yicai
    Yu, Bin
    [J]. COMPUTER NETWORKS, 2024, 247