Internet of Things: An End-to-End Security Layer

被引:0
|
作者
Behrens, Reinhard [1 ]
Ahmed, Ali [2 ]
机构
[1] Univ Liverpool, Laureate Educ, Sch Comp, Liverpool, Merseyside, England
[2] Cairo Univ, Fac Comp & Informat, Dept Comp Sc, Giza, Giza Governorat, Egypt
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A case is made in this paper for a single end-to-end Application Security Layer (ASL). The ASL caters for reliable and confidential communications within a constrained Internet of Things (IoT) environment. To provide a secure key exchange and to setup a secure data connection, the TLS protocol is used. This paper studies the use of TLS over JSON via a CoAP RESTful service. This method provides a way for end-to-end communication flexibility and potentially retain identity information for repudiation. A proof of concept has been developed to prove the hypothesis. The prototype simulates an IoT software client with the capability of hosting a CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages were intercepted and verified against a simulated MITM attack. The experimental results confirm that TLS over JSON is possible. Using TLS over CoAP forced larger TLS packets to be split into multiple sections. This provided an unexpected security benefit, as each TLS record larger than 1024 bytes is fractured, and reassembled only at the receiving end-point. The encrypted data is thus scattered and could take different routes to reach the intended recipient.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [1] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [2] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    [J]. COMPUTER, 2018, 51 (04) : 20 - 27
  • [3] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    [J]. 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [4] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    [J]. 2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [5] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    [J]. 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [6] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    [J]. 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [7] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [8] Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things
    Sahraoui, Somia
    Bilami, Azeddine
    [J]. MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 249 - 260
  • [9] A Novel Edge Security Gateway for End-to-End Protection in Industrial Internet of Things
    Khan, Rafiullah
    McLaughlin, Kieran
    Kang, BooJoong
    Laverty, David
    Sezer, Sakir
    [J]. 2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [10] An End-to-End Reliability Framework of the Internet of Things
    Azghiou, Kamal
    El Mouhib, Manal
    Koulali, Mohammed-Amine
    Benali, Abdelhamid
    [J]. SENSORS, 2020, 20 (09)