Internet of Things: An End-to-End Security Layer

被引:0
|
作者
Behrens, Reinhard [1 ]
Ahmed, Ali [2 ]
机构
[1] Univ Liverpool, Laureate Educ, Sch Comp, Liverpool, Merseyside, England
[2] Cairo Univ, Fac Comp & Informat, Dept Comp Sc, Giza, Giza Governorat, Egypt
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A case is made in this paper for a single end-to-end Application Security Layer (ASL). The ASL caters for reliable and confidential communications within a constrained Internet of Things (IoT) environment. To provide a secure key exchange and to setup a secure data connection, the TLS protocol is used. This paper studies the use of TLS over JSON via a CoAP RESTful service. This method provides a way for end-to-end communication flexibility and potentially retain identity information for repudiation. A proof of concept has been developed to prove the hypothesis. The prototype simulates an IoT software client with the capability of hosting a CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages were intercepted and verified against a simulated MITM attack. The experimental results confirm that TLS over JSON is possible. Using TLS over CoAP forced larger TLS packets to be split into multiple sections. This provided an unexpected security benefit, as each TLS record larger than 1024 bytes is fractured, and reassembled only at the receiving end-point. The encrypted data is thus scattered and could take different routes to reach the intended recipient.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 50 条
  • [31] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [32] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
    Porambage, Pawani
    Braeken, An
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
  • [33] End-to-End Sample Tracking in the Laboratory Using a Custom Internet of Things Device
    Neil, William
    Zipp, Greg
    Nemeth, Gregory
    Russo, Mark F.
    Nirschl, David S.
    [J]. SLAS TECHNOLOGY, 2018, 23 (05): : 412 - 422
  • [34] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [35] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [36] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [37] Integrated transport layer security: End-to-end security model between WTLS and TLS
    Kwon, EK
    Cho, YG
    Chae, KJ
    [J]. 15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 65 - 71
  • [38] Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    Gupta, Vipul
    Wurm, Michael
    Zhu, Yu
    Millard, Matthew
    Fung, Stephen
    Gura, Nils
    Eberle, Hans
    Shantz, Sheueling Chang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2005, 1 (04) : 425 - 445
  • [39] An End-to-End Trainable Feature Selection-Forecasting Architecture Targeted at the Internet of Things
    Nakip, Mert
    Karakayali, Kubilay
    Guzelis, Cuneyt
    Rodoplu, Volkan
    [J]. IEEE ACCESS, 2021, 9 : 104011 - 104028
  • [40] An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things
    Hassini, Karima
    Khalis, Safae
    Habibi, Omar
    Chemmakha, Mohammed
    Lazaar, Mohamed
    [J]. KNOWLEDGE-BASED SYSTEMS, 2024, 294