Toward the inclusion of end-to-end security in the OM2M platform

被引:0
|
作者
Simone Patonico
Thanh-Long Nguyen
Placide Shabisha
An Braeken
Kris Steenhaut
机构
[1] Vrije Universiteit Brussel,
[2] IMEC,undefined
来源
The Journal of Supercomputing | 2021年 / 77卷
关键词
CoAPS; ECQV; Tinydtls; MicroECC; Scandium; OneM2M; interoperability; Authentication; Authorization;
D O I
暂无
中图分类号
学科分类号
摘要
The exponential growth in the number of Internet of things (IoT) devices and their potential in many applications in a vast number of domains fuelled the development of different IoT platforms, supported by big companies and industry groups. These platforms are able to provide reliable services to IoT devices and reduce the time to market for the targeted applications. Unfortunately, these proprietary solutions fragment the IoT market and hamper horizontal integration. The need to interoperate the different IoT platforms and communication protocols pushed the Standards Developing Organizations (SDOs) to the specification of a machine-to-machine (M2M) service layer, published as the oneM2M (OM2M) standard. Although the OM2M standard provides generic guidelines to implement security solutions which include authentication, authorization, confidentiality and data integrity, more efficient security schemes should be investigated when constrained IoT devices are concerned. This paper presents two main contributions. First, a CoAPS binding for the OM2M platform is provided that enables secure and reliable communication with constrained IoT devices. Second, a lightweight dynamic access control system is designed, developed and integrated in a OM2M-based architecture. It allows to dynamically grant or revoke access permission in an anonymous way to constrained IoT devices for controlling some actuators. From the experimental results, we can conclude that the computational complexity of the proposed security scheme is extremely low for the client device which requests data access. We show that a constrained IoT device establishes a trust relationship with the OM2M server in few seconds.
引用
收藏
页码:4056 / 4080
页数:24
相关论文
共 50 条
  • [1] Toward the inclusion of end-to-end security in the OM2M platform
    Patonico, Simone
    Nguyen, Thanh-Long
    Shabisha, Placide
    Braeken, An
    Steenhaut, Kris
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 4056 - 4080
  • [2] Secure OM2M Service Platform
    Sicari, Sabrina
    Rizzardi, Alessandra
    Coen-Porisini, Alberto
    Grieco, Luigi Alfredo
    Monteil, Thierry
    2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 313 - 318
  • [3] A security gateway application for End-to-End M2M communications
    Chen, Hsing-Chung
    You, Ilsun
    Weng, Chien-Erh
    Cheng, Chia-Hsin
    Huang, Yung-Fa
    COMPUTER STANDARDS & INTERFACES, 2016, 44 : 85 - 93
  • [4] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [5] J2ME end-to-end security for m-commerce
    Itani, W
    Kayssi, AI
    WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 2015 - 2020
  • [6] Designing a holistic end-to-end intelligent network analysis and security platform
    Alzahrani, M.
    2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
  • [7] End-to-end integrated security and performance analysis on the DEGAS choreographer platform
    Buchholtz, M
    Gilmore, S
    Haenel, V
    Montangero, C
    FM 2005: FORMAL METHODS, PROCEEDINGS, 2005, 3582 : 286 - 301
  • [8] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [9] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [10] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90