Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

被引:13
作者
Oliver, S. Gladson [1 ]
Purusothaman, T. [2 ]
机构
[1] Govt Coll Technol, Dept Informat Technol, Coimbatore 641013, Tamil Nadu, India
[2] Govt Coll Technol, Dept Elect & Commun Engn, Coimbatore 641013, Tamil Nadu, India
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2022年 / 41卷 / 02期
关键词
IoT; CoAP; AES; encryption; message transmisssion; INTERNET; WEB;
D O I
10.32604/csse.2022.020888
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol is proposed. Internet of things enables devices with different characteristics and capabilities to be integrated with internet. These heterogeneous devices should interoperate with each other to accumulate, process and transmit data for facilitating smart services. The growth of IoT applications leads to the rapid growth of IoT devices incorporated to the global network and network traffic over the traditional network. This scheme greatly reduces the authentication overhead between the devices by reducing the packet size of messages, number of messages transmitted and processing overhead on communicating devices. Efficiency of this authentication scheme against attacks such as DoS (denial of service), replay attacks and attacks to exhaust the resources are also examined. Message transmission time reduced upto 50% of using proposed techniques.
引用
收藏
页码:767 / 780
页数:14
相关论文
共 25 条
[1]  
[Anonymous], 2011, P EXT INT LOW POW LO
[2]  
[Anonymous], 2007, 5055 RFC
[3]  
Arvind S., 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), P655, DOI 10.1109/ICACCS.2019.8728533
[4]  
Bahnasawi MA, 2016, INT C MICROELECTRON, P285, DOI 10.1109/ICM.2016.7847871
[5]  
Datta P, 2017, INT CONF COMPUT
[6]  
Fielding R., 2014, HYPERTEXT TRANSFER P, V7231
[7]   On the effectiveness of end-to-end security for Internet-integrated sensing applications [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, :87-93
[8]  
Hartke K., 2014, Tech. Rep., DOI [10.17487/rfc7252, DOI 10.17487/RFC7252]
[9]  
Hartke K., 2012, DRAFTHARTKECORECODTL
[10]   A payload-based mutual authentication scheme for Internet of Things [J].
Jan, Mian Ahmad ;
Khan, Fazlullah ;
Alam, Muhammad ;
Usman, Muhammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 :1028-1039