Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things

As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things.

[1]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[2]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[3]  Zach Shelby,et al.  Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.

[4]  Elaine B. Barker Recommendation for Key Management, Part 1: General , 2016 .

[5]  Salvatore Loreto,et al.  Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP) , 2017, RFC.

[6]  David A. McGrew,et al.  AES-CCM Cipher Suites for Transport Layer Security (TLS) , 2012, RFC.

[7]  Anna Calveras Augé,et al.  A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications , 2015, Sensors.

[8]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[9]  Hannes Tschofenig,et al.  Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .

[10]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[11]  K. Kuladinithi,et al.  Implementation of CoAP and its Application in Transport Logistics , 2011 .

[12]  Carsten Bormann,et al.  Terminology for Constrained-Node Networks , 2014, RFC.

[13]  Enzo Mingozzi,et al.  CoAP Proxy Virtualization for the Web of Things , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[14]  Klaus Wehrle,et al.  Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[15]  Hannes Tschofenig,et al.  Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.

[16]  Luigi Atzori,et al.  The Virtual Object as a Major Element of the Internet of Things: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[17]  David A. McGrew,et al.  AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS , 2014, RFC.

[18]  Antonio Iera,et al.  A CoAP-compliant solution for efficient inclusion of RFID in the Internet of Things , 2014, 2014 IEEE Global Communications Conference.

[19]  Hannes Tschofenig,et al.  Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things , 2016, RFC.

[20]  Namhi Kang,et al.  IoT–Cloud collaboration to establish a secure connection for lightweight devices , 2017, Wirel. Networks.

[21]  David A. McGrew,et al.  An Interface and Algorithms for Authenticated Encryption , 2008, RFC.

[22]  Óscar García-Morchón,et al.  Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.

[23]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[24]  Antonio F. Gómez-Skarmeta,et al.  IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6) , 2013, Sensors.

[25]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[26]  Simon Mayer,et al.  Moving Application Logic from the Firmware to the Cloud: Towards the Thin Server Architecture for the Internet of Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[27]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[28]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[29]  Klaus Hartke,et al.  Observing Resources in the Constrained Application Protocol (CoAP) , 2015, RFC.

[30]  Enzo Mingozzi,et al.  Efficient proxying of CoAP observe with quality of service support , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[31]  Ingrid Moerman,et al.  Secure communication in IP-based wireless sensor networks via a trusted gateway , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[32]  Andrzej Duda,et al.  DTLS performance in duty-cycled networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).