Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography

Currently, the concept of the Internet of Things (IoT) has become more noticeable where it is being used in all aspects of life, such as home automation, smart cities, military surveillance, security, agriculture, healthcare, etc., However, the heterogeneity of the constrained devices and the complexity of the internet bring up the need for a security system to secure all the communications, data and participating things. In this paper, This paper proposed a lightweight secure Constrained Application Protocol (CoAP) using Elliptic Curve Cryptography (ECC) to transport security between IoT objects and the Resource Directory (RD). The advantage of using ECC is its compact key size enabling it to utilize a smaller key size compared to the other identification methods such as Rivest-Shamir-Adleman (RSA). This work mainly has two parts; the first part implements the CoAP using ECC and using RSA algorithms where the results have proven that using ECC much better than RSA in terms of energy saving. The second part of this paper shows the proposed evaluation function and focuses on the security services that were applied in the proposed protocol. The results show that authentication achieved a 75.3% energy savings, data integrity had a 55.7% energy saving and confidentiality achieved a 47% energy saving.

[1]  Akbar Rahman,et al.  Group Communication for CoAP , 2011 .

[2]  Abhijan Bhattacharyya,et al.  Lightweight security scheme for IoT applications using CoAP , 2014, Int. J. Pervasive Comput. Commun..

[3]  Soma Bandyopadhyay,et al.  LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[4]  Matt Welsh,et al.  Integrating wireless sensor networks with the grid , 2004, IEEE Internet Computing.

[5]  Bill Curtis Delivering security by design in the Internet of Things , 2014, ITC.

[6]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[7]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[8]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[9]  Aboubaker Lasebae,et al.  Security analysis of the constrained application protocol in the Internet of Things , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[10]  Namhi Kang,et al.  Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).

[11]  Hui Tian,et al.  Energy Efficient Implementation of IETF Constrained Protocol Suite , 2013 .

[12]  Alireza Ahrary,et al.  IoT-security Approach Analysis for the Novel Nutrition-Based Vegetable Production and Distribution System , 2014, 2014 IIAI 3rd International Conference on Advanced Applied Informatics.

[13]  George Papadopoulos,et al.  Battery Lifetime Prediction Model for a WSN Platform , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.