A Group-Oriented DTLS Handshake for Secure IoT Applications

被引:20
作者
Park, Chang-Seop [1 ]
Park, Wang-Seok [2 ]
机构
[1] Dankook Univ, Dept Software Sci, Yongin 16890, South Korea
[2] AhnLab, Seongnam 13493, South Korea
基金
新加坡国家研究基金会;
关键词
Constrained application protocol (CoAP); datagram transport layer security (DTLS); fine-grained access control; Internet of Things (IoT); key management; KEY ESTABLISHMENT; THINGS; INTERNET;
D O I
10.1109/TASE.2018.2855640
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The datagram transport layer security (DTLS) is a de facto standard for the end-to-end security of the constrained application protocol (CoAP) that defines the following three security modes: preshared key (PSK), raw public key, and certificate. The pros and cons of each security mode are obvious. Even though the PSK mode is the most preferable in terms of the performance of the DTLS handshake, the in-advance distribution of a unique symmetric key for each pair of endpoints is difficult as the number of pairs increases. Alternatively, the certificate mode provides a convenient key-management functionality but its performance is very poor. The focus of most of the previous works is the reduction of the computational load for a single DTLS handshake that is induced by the certificate mode. In this paper, a group-oriented end-to-end security is considered, together with the introduction of a new security mode. Namely, a security association is established between a CoAP client and a group of CoAP servers (sensor devices); however, a fine-grained access control can be enforced so that each CoAP client can access a limited number of CoAP servers in the group. Furthermore, when each CoAP client performs several DTLS handshakes with the CoAP servers in the group, the first DTLS handshake involves a single public-key operation. A public-key operation, however, is not required for the subsequent DTLS handshakes, so the overall computational burden can be reduced. Also, a testbed was established along with the implementation of the proposed security mechanism for the conduction of a performance comparison with the other security mechanisms.
引用
收藏
页码:1920 / 1929
页数:10
相关论文
共 27 条
[11]   DCapBAC: embedding authorization logic into smart things through ECC optimizations [J].
Hernandez-Ramos, Jose L. ;
Jara, Antonio J. ;
Marin, Leandro ;
Skarmeta Gomez, Antonio F. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) :345-366
[12]  
Hui J., 2011, IETF 6LO WG
[13]  
Hummen R., 2013, Proc. 2nd ACM Work. Hot Top. Wirel. Netw. Secur. Priv. - HotWiSec, V13, P37, DOI 10.1145/2463183
[14]  
Hummen R, 2014, IEEE INT CONF SENS, P284, DOI 10.1109/SAHCN.2014.6990364
[15]   ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks [J].
Kang, Namhi ;
Park, Jiye ;
Kwon, Hyeokjin ;
Jung, Souhwan .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[16]   DTLS based security and two-way authentication for the Internet of Things [J].
Kothmayr, Thomas ;
Schmitt, Corinna ;
Hu, Wen ;
Bruenig, Michael ;
Carle, Georg .
AD HOC NETWORKS, 2013, 11 (08) :2710-2723
[18]   IoT-Cloud collaboration to establish a secure connection for lightweight devices [J].
Park, Jiye ;
Kwon, Hyeokjin ;
Kang, Namhi .
WIRELESS NETWORKS, 2017, 23 (03) :681-692
[19]  
Porambage P, 2015, IEEE INT CONF COMM, P2677, DOI 10.1109/ICCW.2015.7247583
[20]   PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications [J].
Porambage, Pawani ;
Schmitt, Corinna ;
Kumar, Pardeep ;
Gurtov, Andrei ;
Ylianttila, Mika .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,