ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

被引:30
作者
Majumder, Suman [1 ]
Ray, Sangram [1 ]
Sadhukhan, Dipanwita [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur 492010, Madhya Pradesh, India
关键词
Internet of Things (IoT); Elliptic curve cryptography (ECC); Constraint application protocol (CoAP); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; ARCHITECTURE; SECURITY;
D O I
10.1007/s11277-020-07769-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.
引用
收藏
页码:1867 / 1896
页数:30
相关论文
共 54 条
  • [1] Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure
    Adhikari, Sharmistha
    Ray, Sangram
    Obaidat, Mohammad S.
    Biswas, G. P.
    [J]. COMPUTER COMMUNICATIONS, 2020, 157 : 187 - 203
  • [2] Efficient and secure business model for content centric network using elliptic curve cryptography
    Adhikari, Sharmistha
    Ray, Sangram
    Biswas, Gosta P.
    Obaidat, Mohammad S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [3] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [4] Albalas F, 2018, POWER MW, V1333, P151
  • [5] Alghamdi TA, 2013, TOP HIST PHIL, P163, DOI 10.1109/FGCT.2013.6767217
  • [6] A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
    Ali, Rifaqat
    Pal, Arup Kumar
    Kumari, Saru
    Karuppiah, Marimuthu
    Conti, Mauro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 200 - 215
  • [7] Alliance O. M, 2002, GENERIC CONTENT DOWN
  • [8] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [9] [Anonymous], 2007, Applied cryptography: protocols, algorithms
  • [10] LESS: Lightweight Establishment of Secure Session A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption
    Bhattacharyya, Abhijan
    Bose, Tulika
    Bandyopadhyay, Soma
    Ukil, Arijit
    Pal, Arpan
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 682 - 687