Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography

被引:1
作者
Albalas, Firas [1 ]
Al-Soud, Majd [1 ]
Almomani, Omar [2 ]
Almomani, Ammar [3 ]
机构
[1] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
[2] World Islamic Sci & Educ Univ, Network Comp & Informat Syst Dept, Amman, Jordan
[3] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Informat Technol, Salt, Jordan
关键词
IoT; CoAP; ECC; energy saving; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently, the concept of the Internet of Things (IoT) has become more noticeable where it is being used in all aspects of life, such as home automation, smart cities, military surveillance, security, agriculture, healthcare, etc., However, the heterogeneity of the constrained devices and the complexity of the internet bring up the need for a security system to secure all the communications, data and participating things. In this paper, This paper proposed a lightweight secure Constrained Application Protocol (CoAP) using Elliptic Curve Cryptography (ECC) to transport security between IoT objects and the Resource Directory (RD). The advantage of using ECC is its compact key size enabling it to utilize a smaller key size compared to the other identification methods such as Rivest-Shamir-Adleman (RSA). This work mainly has two parts; the first part implements the CoAP using ECC and using RSA algorithms where the results have proven that using ECC much better than RSA in terms of energy saving. The second part of this paper shows the proposed evaluation function and focuses on the security services that were applied in the proposed protocol. The results show that authentication achieved a 75.3% energy savings, data integrity had a 55.7% energy saving and confidentiality achieved a 47% energy saving.
引用
收藏
页码:550 / 558
页数:9
相关论文
共 16 条
  • [1] ALBALAS F, 2017, P INT AR C INF TECHN
  • [2] Alghamdi TA, 2013, TOP HIST PHIL, P163, DOI 10.1109/FGCT.2013.6767217
  • [3] [Anonymous], P EXT INT LOW POW LO
  • [4] LESS: Lightweight Establishment of Secure Session A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption
    Bhattacharyya, Abhijan
    Bose, Tulika
    Bandyopadhyay, Soma
    Ukil, Arijit
    Pal, Arpan
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 682 - 687
  • [5] Brachmann M., 2011, TECHNICAL REPORT
  • [6] Cao Z., 2014, TECHNICAL REPORT
  • [7] Curtis B., 2014, P IEEE INT TEST C SE, P1
  • [8] Battery Lifetime Prediction Model for a WSN Platform
    Kerasiotis, Fotis
    Prayati, Aggeliki
    Antonopoulos, Christos
    Koulamas, Christos
    Papadopoulos, George
    [J]. 2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 525 - 530
  • [9] Kothmayr T., 2011, THESIS
  • [10] DTLS based security and two-way authentication for the Internet of Things
    Kothmayr, Thomas
    Schmitt, Corinna
    Hu, Wen
    Bruenig, Michael
    Carle, Georg
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2710 - 2723