An Analysis of Secure M2M Communication in WSNs Using DTLS

The Internet of Things is a paradigm that is becoming more and more implemented in a wide variety of devices that communicate between themselves. Under the form of a Machine-to-Machine (M2M) communication, it is integrated by a highly heterogeneous community where many devices are constrained in resources, being yet transmitting sensible data. Therefore, it is necessary to guarantee that the M2M communication is equally safer that traditional networks, in which the HTTP Secure (HTTPS) protocol is used. With this aim, we propose in this paper the implementation of the Constrained Application Protocol (CoAP) together with the Datagram Transport Secure Layer (DTLS), all based on the Contiki operating system, this last being a very popular development platform for WSNs. Additionally, we present an analysis of the threats that occur in the previously described communication environments in order to identify key elements in the previous protocols to insure a secure M2M communication.

[1]  Hannes Tschofenig,et al.  Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .

[2]  Ingrid Moerman,et al.  Secure communication in IP-based wireless sensor networks via a trusted gateway , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[3]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[4]  Ana R. Cavalli,et al.  A Survey on Wireless Sensors Networks Security Based on a Layered Approach , 2015, WWIC.

[5]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[6]  Jorge Sá Silva,et al.  On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[7]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[8]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[9]  Carlos Pereira,et al.  Towards Efficient Mobile M2M Communications: Survey and Open Challenges , 2014, Sensors.

[10]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[11]  Michele Zorzi,et al.  BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).