A Group-Oriented DTLS Handshake for Secure IoT Applications

被引:20
作者
Park, Chang-Seop [1 ]
Park, Wang-Seok [2 ]
机构
[1] Dankook Univ, Dept Software Sci, Yongin 16890, South Korea
[2] AhnLab, Seongnam 13493, South Korea
基金
新加坡国家研究基金会;
关键词
Constrained application protocol (CoAP); datagram transport layer security (DTLS); fine-grained access control; Internet of Things (IoT); key management; KEY ESTABLISHMENT; THINGS; INTERNET;
D O I
10.1109/TASE.2018.2855640
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The datagram transport layer security (DTLS) is a de facto standard for the end-to-end security of the constrained application protocol (CoAP) that defines the following three security modes: preshared key (PSK), raw public key, and certificate. The pros and cons of each security mode are obvious. Even though the PSK mode is the most preferable in terms of the performance of the DTLS handshake, the in-advance distribution of a unique symmetric key for each pair of endpoints is difficult as the number of pairs increases. Alternatively, the certificate mode provides a convenient key-management functionality but its performance is very poor. The focus of most of the previous works is the reduction of the computational load for a single DTLS handshake that is induced by the certificate mode. In this paper, a group-oriented end-to-end security is considered, together with the introduction of a new security mode. Namely, a security association is established between a CoAP client and a group of CoAP servers (sensor devices); however, a fine-grained access control can be enforced so that each CoAP client can access a limited number of CoAP servers in the group. Furthermore, when each CoAP client performs several DTLS handshakes with the CoAP servers in the group, the first DTLS handshake involves a single public-key operation. A public-key operation, however, is not required for the subsequent DTLS handshakes, so the overall computational burden can be reduced. Also, a testbed was established along with the implementation of the proposed security mechanism for the conduction of a performance comparison with the other security mechanisms.
引用
收藏
页码:1920 / 1929
页数:10
相关论文
共 27 条
[1]  
[Anonymous], CC2538 POW WIR MICR
[2]  
[Anonymous], 2010, SEC 2 REC ELL CURV D
[3]  
[Anonymous], 2014, 7252 IETF
[4]  
[Anonymous], 2011, 8021542011 IEEE
[5]  
[Anonymous], 2012, 6347 IETF RFC
[6]  
[Anonymous], 2007, 4944 IETF RFC
[7]   Lightweight collaborative key establishment scheme for the Internet of Things [J].
Ben Saied, Yosra ;
Olivereau, Alexis ;
Zeghlache, Djamal ;
Laurent, Maryline .
COMPUTER NETWORKS, 2014, 64 :273-295
[8]  
Brown D.R., 2001, INT C FINANCIAL CRYP, P156
[9]  
FREEMAN T, 2007, 5055 IETF RFC
[10]  
Granjal J., 2013, IFIP Networking Conference, 2013, P1