Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography

被引:1
|
作者
Albalas, Firas [1 ]
Al-Soud, Majd [1 ]
Almomani, Omar [2 ]
Almomani, Ammar [3 ]
机构
[1] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
[2] World Islamic Sci & Educ Univ, Network Comp & Informat Syst Dept, Amman, Jordan
[3] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Informat Technol, Salt, Jordan
关键词
IoT; CoAP; ECC; energy saving; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently, the concept of the Internet of Things (IoT) has become more noticeable where it is being used in all aspects of life, such as home automation, smart cities, military surveillance, security, agriculture, healthcare, etc., However, the heterogeneity of the constrained devices and the complexity of the internet bring up the need for a security system to secure all the communications, data and participating things. In this paper, This paper proposed a lightweight secure Constrained Application Protocol (CoAP) using Elliptic Curve Cryptography (ECC) to transport security between IoT objects and the Resource Directory (RD). The advantage of using ECC is its compact key size enabling it to utilize a smaller key size compared to the other identification methods such as Rivest-Shamir-Adleman (RSA). This work mainly has two parts; the first part implements the CoAP using ECC and using RSA algorithms where the results have proven that using ECC much better than RSA in terms of energy saving. The second part of this paper shows the proposed evaluation function and focuses on the security services that were applied in the proposed protocol. The results show that authentication achieved a 75.3% energy savings, data integrity had a 55.7% energy saving and confidentiality achieved a 47% energy saving.
引用
收藏
页码:550 / 558
页数:9
相关论文
共 50 条
  • [21] BSD-based Elliptic Curve Cryptography for the Open Internet of Things
    Pinol, Oriol Pinol
    Raza, Shahid
    Eriksson, Joakim
    Voigt, Thiemo
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [22] Security-Aware and Privacy-Preserving Communication in the Internet of Things: A Review
    Priya, J.
    Gunasekaran, M.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 225 - 230
  • [23] RETRACTED: Applicability of Elliptic Curve Cryptography on Internet of Things (Retracted Article)
    Zhao, Guanglei
    Wang, Jingcheng
    Luo, Jian
    Long, Xiao
    Si, Xianping
    2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11
  • [24] ELLIPTIC CURVE CRYPTOGRAPHY FOR CONSTRAINED DEVICES IN INTERNET OF THINGS AND INDUSTRY 4.0
    Cvrcek, Tadeas
    PROCEEDINGS II OF THE 26TH CONFERENCE STUDENT EEICT 2020, 2020, : 48 - 51
  • [25] Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
  • [26] An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
    He, Debiao
    Zeadally, Sherali
    IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01): : 72 - 83
  • [27] Security-Aware Routing Protocol Based on Artificial Neural Network Algorithm and 6LoWPAN in the Internet of Things
    Lu, Jiangdong
    Li, Dongfang
    Wang, Penglong
    Zheng, Fen
    Wang, Meng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [28] Leveraging Fog Computing for Security-Aware Resource Allocation in Narrowband Internet of Things
    Mohan, Vamshi Sunku
    Sankaran, Sriram
    Buyya, Rajkumar
    Achuthan, Krishnashree
    SOFTWARE-PRACTICE & EXPERIENCE, 2025, 55 (04): : 683 - 713
  • [29] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [30] Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
    Liu, Zhe
    Seo, Hwajeong
    Castiglione, Aniello
    Choo, Kim-Kwang Raymond
    Kim, Howon
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 521 - 529