End-to-End Message Authentication Using CoAP Over IoT

被引:4
|
作者
Singhal, Prateek [1 ]
Sharma, Puneet [1 ]
Hazela, Bramah [1 ]
机构
[1] Amity Univ, Dept Comp Sci & Engn, Noida, Uttar Pradesh, India
关键词
IoT (Internet of Things); CoAP (Constrained Application Protocol); DTLS; Internet protocol stack; Cooja;
D O I
10.1007/978-981-13-2324-9_28
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet of Things is a new innovative technology topic under a science fiction and imagination or virtual world associated by visualizing physical world. There are conjecture and cybernetic world still possible about it. This is a truly abundant terrain of fantasy and original ideas when the combination of real life and virtual life through IoT. The interconnection of embedded devices, sensors, actuators can communicate the information from one to another (M2M) over Internet and data exchange. The important challenge faced in IoT is security which helps to secure the information through data exchanging, and is known as Web of Things (WoT). Moreover, to perform routing in 6LoWPAN network, RPL uses destination-oriented DAG (DODAG) between the different IPv6 nodes. We can also interface the CoAP and 6LoWPAN through RPL using UDP protocol for various constrained nodes in Contiki OS. In this paper, we focus on the proposed project Constraint Application Protocol (CoAP) that falls under a software component at application layer. The DTLS security based on LESS algorithm is provided under the CoAP protocol and gives the unicast messages because DTLS does not support multicast. The proposed solution to make a multicast message is distributing session key using key distribution centre. This is used to encrypt or decrypt the multicast message and then design and improve the cryptography algorithm. We have implemented this proposed work on the Contiki OS with the framework using Cooja simulator that is an erudite tool to make the work more efficient and optimized it.
引用
收藏
页码:279 / 288
页数:10
相关论文
共 50 条
  • [31] A system for end-to-end authentication of adaptive multimedia content
    Suzuki, T
    Ramzan, Z
    Fujimoto, H
    Gentry, C
    Nakayama, T
    Jain, R
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 237 - 249
  • [32] End-to-end malware detection for android IoT devices using deep learning
    Ren, Zhongru
    Wu, Haomin
    Ning, Qian
    Hussain, Iftikhar
    Chen, Bingcai
    [J]. AD HOC NETWORKS, 2020, 101
  • [33] End-to-End QoS over Internet
    Joshi, Rajesh
    Saraph, Girish P.
    [J]. 2007 FIRST INTERNATIONAL SYMPOSIUM ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS, 2007, : 13 - 14
  • [34] End-to-end over interplanetary networks
    Filman, RE
    [J]. IEEE INTERNET COMPUTING, 2003, 7 (05) : 4 - 5
  • [35] An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
    Nashwan, Shadi
    Nashwan, Imad I. H.
    [J]. SENSORS, 2021, 21 (15)
  • [36] Blockchain in IoT Systems: End-to-End Delay Evaluation
    Alaslani, Maha
    Nawab, Faisal
    Shihada, Basem
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8332 - 8344
  • [37] From IoT to Cloud: An End-to-End Virtualization Approach
    Leivadeas, Aris
    [J]. 2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 1554 - 1557
  • [38] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [39] Kaala: Scalable, End-to-End, IoT System Simulator
    Dayalan, Udhaya Kumar
    Fezeu, Rostand A. K.
    Salo, Timothy J.
    Zhang, Zhi-Li
    [J]. PROCEEDINGS OF THE ACM SIGCOMM 2022 WORKSHOP ON NETWORKED SENSING SYSTEMS FOR A SUSTAINABLE SOCIETY, NET4US 2022, 2022, : 33 - 38
  • [40] End-to-End Industrial IoT: Software Optimization and Acceleration
    Arunachalam, Meena
    Sanghavi, Vrushabh
    Kaira, Samudyatha
    Ahuja, Nilesh A.
    [J]. IEEE Internet of Things Magazine, 2022, 5 (01): : 48 - 53