Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography

被引:1
|
作者
Albalas, Firas [1 ]
Al-Soud, Majd [1 ]
Almomani, Omar [2 ]
Almomani, Ammar [3 ]
机构
[1] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
[2] World Islamic Sci & Educ Univ, Network Comp & Informat Syst Dept, Amman, Jordan
[3] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Informat Technol, Salt, Jordan
关键词
IoT; CoAP; ECC; energy saving; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently, the concept of the Internet of Things (IoT) has become more noticeable where it is being used in all aspects of life, such as home automation, smart cities, military surveillance, security, agriculture, healthcare, etc., However, the heterogeneity of the constrained devices and the complexity of the internet bring up the need for a security system to secure all the communications, data and participating things. In this paper, This paper proposed a lightweight secure Constrained Application Protocol (CoAP) using Elliptic Curve Cryptography (ECC) to transport security between IoT objects and the Resource Directory (RD). The advantage of using ECC is its compact key size enabling it to utilize a smaller key size compared to the other identification methods such as Rivest-Shamir-Adleman (RSA). This work mainly has two parts; the first part implements the CoAP using ECC and using RSA algorithms where the results have proven that using ECC much better than RSA in terms of energy saving. The second part of this paper shows the proposed evaluation function and focuses on the security services that were applied in the proposed protocol. The results show that authentication achieved a 75.3% energy savings, data integrity had a 55.7% energy saving and confidentiality achieved a 47% energy saving.
引用
收藏
页码:550 / 558
页数:9
相关论文
共 50 条
  • [41] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [42] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [43] An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
    Maarouf, Asmaa
    Sakr, Rasha
    Elmougy, Samir
    IEEE ACCESS, 2024, 12 : 134902 - 134925
  • [44] Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things
    Liu, Zhe
    Grossschadl, Johann
    Hu, Zhi
    Jarvinen, Kimmo
    Wang, Husen
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (05) : 773 - 785
  • [45] An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    Obaidat, Mohammad S.
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2154 - 2163
  • [46] Delay-Aware Application Protocol for Internet of Things
    Han, Yanyan
    Seed, Dale
    Wang, Chonggang
    Li, Xu
    Ly, Quang
    Chen, Zhuo
    IEEE NETWORK, 2019, 33 (01): : 120 - 127
  • [47] SCOF: Security-Aware Computation Offloading Using Federated Reinforcement Learning in Industrial Internet of Things With Edge Computing
    Peng, Kai
    Xiao, Peiyun
    Wang, Shangguang
    Leung, Victor C. M.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (04) : 1780 - 1792
  • [48] Design, Analysis, and Experimental Evaluation of a New Secure Rejoin Mechanism for LoRaWAN Using Elliptic-Curve Cryptography
    Milani, Stefano
    Chatzigiannakis, Ioannis
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2021, 10 (02)
  • [49] Security Analysis of the Constrained Application Protocol in the Internet of Things
    Alghamdi, Thamer A.
    Lasebae, Aboubaker
    Aiash, Mahdi
    2013 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT 2013), 2013, : 163 - 168
  • [50] Privacy-aware novel lightweight cryptography mechanism for IoT (Internet of Things) Security
    Rashmi, H. C.
    Guruprakash, C. D.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (31) : 76389 - 76404