Toward the inclusion of end-to-end security in the OM2M platform

被引:0
作者
Simone Patonico
Thanh-Long Nguyen
Placide Shabisha
An Braeken
Kris Steenhaut
机构
[1] Vrije Universiteit Brussel,
[2] IMEC,undefined
来源
The Journal of Supercomputing | 2021年 / 77卷
关键词
CoAPS; ECQV; Tinydtls; MicroECC; Scandium; OneM2M; interoperability; Authentication; Authorization;
D O I
暂无
中图分类号
学科分类号
摘要
The exponential growth in the number of Internet of things (IoT) devices and their potential in many applications in a vast number of domains fuelled the development of different IoT platforms, supported by big companies and industry groups. These platforms are able to provide reliable services to IoT devices and reduce the time to market for the targeted applications. Unfortunately, these proprietary solutions fragment the IoT market and hamper horizontal integration. The need to interoperate the different IoT platforms and communication protocols pushed the Standards Developing Organizations (SDOs) to the specification of a machine-to-machine (M2M) service layer, published as the oneM2M (OM2M) standard. Although the OM2M standard provides generic guidelines to implement security solutions which include authentication, authorization, confidentiality and data integrity, more efficient security schemes should be investigated when constrained IoT devices are concerned. This paper presents two main contributions. First, a CoAPS binding for the OM2M platform is provided that enables secure and reliable communication with constrained IoT devices. Second, a lightweight dynamic access control system is designed, developed and integrated in a OM2M-based architecture. It allows to dynamically grant or revoke access permission in an anonymous way to constrained IoT devices for controlling some actuators. From the experimental results, we can conclude that the computational complexity of the proposed security scheme is extremely low for the client device which requests data access. We show that a constrained IoT device establishes a trust relationship with the OM2M server in few seconds.
引用
收藏
页码:4056 / 4080
页数:24
相关论文
共 36 条
[21]   A PK-SIM card based end-to-end security framework for SMS [J].
He Rongyu ;
Zhao Guolei ;
Chang Chaowen ;
Me Hui ;
Qin Xi ;
Qin Zheng .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :629-641
[22]   Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain [J].
Fei, Shufan ;
Yan, Zheng ;
Xie, Haomeng ;
Liu, Guocang .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01) :761-778
[23]   Energy-Efficient End-to-End Security for Software-Defined Vehicular Networks [J].
Raja, Gunasekaran ;
Anbalagan, Sudha ;
Vijayaraghavan, Geetha ;
Dhanasekaran, Priyanka ;
Al-Otaibi, Yasser D. ;
Bashir, Ali Kashif .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5730-5737
[24]   iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency [J].
Li, Pengkun ;
Su, Jinshu ;
Wang, Xiaofeng .
PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19), 2019, :166-168
[25]   Two-factor Password-authenticated Key Exchange with End-to-end Security [J].
Jarecki, Stanislaw ;
Jubur, Mohammed ;
Krawczyk, Hugo ;
Saxena, Nitesh ;
Shirvanian, Maliheh .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (03)
[26]   Implementing end-to-end encryption strategist for strengthening data security across network communication [J].
Balpande, Vijaya Parag ;
Aher, Ujjwala Bal ;
Borkar, Pradnya ;
Bhanarkar, Parul .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A) :465-476
[27]   A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams [J].
Puthal, Deepak ;
Nepal, Surya ;
Ranjan, Rajiv ;
Chen, Jinjun .
PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, :6011-6020
[28]   Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? [J].
Zhang, Jialei ;
Yan, Zheng ;
Fei, Shufan ;
Wang, Mingjun ;
Li, Tieyan ;
Wang, Haiguang .
IEEE NETWORK, 2022, 36 (01) :105-112
[29]   End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices [J].
Granjal, Jorge ;
Monteiro, Edmundo .
2016 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2016, :306-314
[30]   The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments [J].
Iheagwara, C ;
Blyth, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2002, 39 (06) :827-840