Skip to main content

2020 | OriginalPaper | Buchkapitel

CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP

verfasst von : Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li

Erschienen in: Digital Twin Technologies and Smart Cities

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Constrained Application Protocol (CoAP) is a standard web transfer protocol. The CoAP runs over UDP, resulting in an unreliable message transport. CoAP offers a request/response communication model among application endpoints. The Internet Protocol Security (IPsec) can offer various security services like limited traffic flow confidentiality, anti-replay mechanism, access control, confidentiality, connection-less integrity, and data origin authentication. One way to use IPSec to secure the CoAP transactions can be Encapsulating Security Payload Protocol [RFC 2406] (IPSec-ESP). It can be a special case, if the hardware provisions encryption at layer 2 (it is the situation with some IEEE 802.15.4 radio chips). Another way can be, the 6LowPAN (IPv6 over Low-power Wireless Personal Area Networks) extension, for using the IPSec with Authentication Header (AH) [RFC 2402] and Encapsulation Security Payload (ESP). To give more security to the major User Datagram Protocol (UDP) well-known applications, Datagram Transport Layer Security (DTLS) runs on top of UDP instead of Transmission Control Protocol (TCP). The DTLS offers automatic key management, confidentiality, authentication, and data integrity. It also provisions wide range of dissimilar cryptographic algorithms. We have found that providing end-to-end security is not so easy, so we have developed a Secure Hybrid RSA (SHRSA) cipher. At present, we are using it in personal messaging scheme, and it is able to provide end-to-end security with efficiency and lightweight features. Later, this cipher can be used in lightweight and efficient communication scenario of Internet of Things (IoT) and Internet of Everything (IoE).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jara, A., Kafle, V., Skarmeta, A.: Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture. Int. J. Ad Hoc Ubiquitous Comput. 13(3–4), 228–242 (2013)CrossRef Jara, A., Kafle, V., Skarmeta, A.: Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture. Int. J. Ad Hoc Ubiquitous Comput. 13(3–4), 228–242 (2013)CrossRef
2.
Zurück zum Zitat Li, S., Gong, P., Yang, Q., Li, M., Kong, J., Li, P.: A secure handshake scheme for mobile-hierarchy city intelligent transportation system. In: International Conference on Ubiquitous and Future Networks. ICUFN, Da Nang, pp. 190–191 (2013) Li, S., Gong, P., Yang, Q., Li, M., Kong, J., Li, P.: A secure handshake scheme for mobile-hierarchy city intelligent transportation system. In: International Conference on Ubiquitous and Future Networks. ICUFN, Da Nang, pp. 190–191 (2013)
3.
Zurück zum Zitat Kang, K.C., Pang, Z.B., Wang, C.C.: Security and privacy mechanism for health internet of things. J. China Univ. Posts Telecommun. 20(Suppl 2), 64–68 (2013)CrossRef Kang, K.C., Pang, Z.B., Wang, C.C.: Security and privacy mechanism for health internet of things. J. China Univ. Posts Telecommun. 20(Suppl 2), 64–68 (2013)CrossRef
4.
Zurück zum Zitat Goncalves, F., Macedo, J., Nicolau, M., Santos, A.: Security architecture for mobile e- health applications in medication control. In: 2013 21st International Conference on Software, Telecommunications and Computer Networks. SoftCOM, Primosten, pp. 1–8 (2013) Goncalves, F., Macedo, J., Nicolau, M., Santos, A.: Security architecture for mobile e- health applications in medication control. In: 2013 21st International Conference on Software, Telecommunications and Computer Networks. SoftCOM, Primosten, pp. 1–8 (2013)
5.
Zurück zum Zitat An, J., Gui, X., Zhang, W., Jiang, J., Yang, J.: Research on social relations cognitive model of mobile nodes in internet of things. J. Netw Comput Appl 36(2), 799–810 (2013)CrossRef An, J., Gui, X., Zhang, W., Jiang, J., Yang, J.: Research on social relations cognitive model of mobile nodes in internet of things. J. Netw Comput Appl 36(2), 799–810 (2013)CrossRef
6.
Zurück zum Zitat Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.: Demo: an ids framework for internet of things empowered by 6lowpan, Berlin, Germany, pp. 1337–1339 (2013) Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.: Demo: an ids framework for internet of things empowered by 6lowpan, Berlin, Germany, pp. 1337–1339 (2013)
7.
Zurück zum Zitat BETaaS Consortium (2014) BETaaS building the environment for the things as a service D2. 2. 2–Specification of the extended capabilities of the platform, pp. 1–61 BETaaS Consortium (2014) BETaaS building the environment for the things as a service D2. 2. 2–Specification of the extended capabilities of the platform, pp. 1–61
9.
Zurück zum Zitat Gao, L., Bai, X.: A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac. J. Mark. Logist. 26(2), 211–231 1075 (2014)CrossRef Gao, L., Bai, X.: A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac. J. Mark. Logist. 26(2), 211–231 1075 (2014)CrossRef
10.
Zurück zum Zitat Gazis, V.: Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, and Alex Wiesmaier. Security perspectives for collaborative data acquisition in the internet of things. In: International Conference on Safety and Security in Internet of Things. Springer, New York 1079 (2014) Gazis, V.: Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, and Alex Wiesmaier. Security perspectives for collaborative data acquisition in the internet of things. In: International Conference on Safety and Security in Internet of Things. Springer, New York 1079 (2014)
12.
Zurück zum Zitat Logvinov, O., Kraemer, B., Adams, C., Heiles, J., Stuebing G.: Mary Lynne Nielsen, and Brenda Mancuso. Standard for an architectural framework for the internet of things (IoT) IEEE P2413 Webinar Panelists, pp. 1–12 (2014) Logvinov, O., Kraemer, B., Adams, C., Heiles, J., Stuebing G.: Mary Lynne Nielsen, and Brenda Mancuso. Standard for an architectural framework for the internet of things (IoT) IEEE P2413 Webinar Panelists, pp. 1–12 (2014)
13.
Zurück zum Zitat Zanella, A., Bui, N., Castellani, A.P., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1, 22–32 (2014)CrossRef Zanella, A., Bui, N., Castellani, A.P., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1, 22–32 (2014)CrossRef
14.
Zurück zum Zitat Grieco, L.A., Alaya, M.B., Monteil, T., Drira, K.K.: Architecting information centric ETSI- M2 M systems. In: IEEE PerCom (2014) Grieco, L.A., Alaya, M.B., Monteil, T., Drira, K.K.: Architecting information centric ETSI- M2 M systems. In: IEEE PerCom (2014)
16.
Zurück zum Zitat Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRef Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRef
17.
Zurück zum Zitat Piro, G., Boggia, G., Grieco, L.A.: A standard compliant security framework for IEEE 802.15.4 networks. In: Proceedings of IEEE World Forum on Internet of Things (WF-IoT), Seoul, South Korea, pp. 27–30 (2014) Piro, G., Boggia, G., Grieco, L.A.: A standard compliant security framework for IEEE 802.15.4 networks. In: Proceedings of IEEE World Forum on Internet of Things (WF-IoT), Seoul, South Korea, pp. 27–30 (2014)
18.
Zurück zum Zitat Lee, J.-Y., Lin, W.-C., Huang, Y.-H.: A lightweight authentication protocol for internet of things. In: 2014 International Symposium on Next-Generation Electronics, ISNE 2014, Kwei- Shan, pp. 1–2 (2014) Lee, J.-Y., Lin, W.-C., Huang, Y.-H.: A lightweight authentication protocol for internet of things. In: 2014 International Symposium on Next-Generation Electronics, ISNE 2014, Kwei- Shan, pp. 1–2 (2014)
19.
Zurück zum Zitat Turkanovi, M., Brumen, B., Hlbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)CrossRef Turkanovi, M., Brumen, B., Hlbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)CrossRef
20.
Zurück zum Zitat Ye, N., Zhu, Y., Wang, R.-C.B., Malekian, R., Lin, Q.-M.: An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 1617–1624 (2014)CrossRef Ye, N., Zhu, Y., Wang, R.-C.B., Malekian, R., Lin, Q.-M.: An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 1617–1624 (2014)CrossRef
21.
Zurück zum Zitat Cherkaoui, A., Bossuet, L., Seitz, L., Selander, G., Borgaonkar, R.: New paradigms for access control in constrained environments. In: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Montpellier, pp. 1–4 (2014) Cherkaoui, A., Bossuet, L., Seitz, L., Selander, G., Borgaonkar, R.: New paradigms for access control in constrained environments. In: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Montpellier, pp. 1–4 (2014)
22.
Zurück zum Zitat Peng, L.B., Ru-chuan, W.B., Xiao-yu, S., Long, C.: Privacy protection based on key-changed mutual authentication protocol in internet of things. Commun. Comput. Inf. Sci. 418, 345–355 (2014) Peng, L.B., Ru-chuan, W.B., Xiao-yu, S., Long, C.: Privacy protection based on key-changed mutual authentication protocol in internet of things. Commun. Comput. Inf. Sci. 418, 345–355 (2014)
23.
Zurück zum Zitat Ukil, A., Bandyopadhyay, S., Pal, A.: IoT-privacy: to be private or not to be private. In: Proceedings—IEEE INFOCOM, Toronto, ON, pp. 123–124 (2014) Ukil, A., Bandyopadhyay, S., Pal, A.: IoT-privacy: to be private or not to be private. In: Proceedings—IEEE INFOCOM, Toronto, ON, pp. 123–124 (2014)
24.
Zurück zum Zitat Sicari, S., Cappiello, C., Pellegrini, F.D., Miorandi, D., Coen-Porisini, A.: A security-and quality-aware system architecture for internet of things. Inf. Syst. Front. 18, 1–13 (2014) Sicari, S., Cappiello, C., Pellegrini, F.D., Miorandi, D., Coen-Porisini, A.: A security-and quality-aware system architecture for internet of things. Inf. Syst. Front. 18, 1–13 (2014)
25.
Zurück zum Zitat Tormo, G.D., Marmol, F.G., Perez, G.M.: Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur. Gener. Comput. Syst. 49, 113–124 (2014)CrossRef Tormo, G.D., Marmol, F.G., Perez, G.M.: Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur. Gener. Comput. Syst. 49, 113–124 (2014)CrossRef
26.
Zurück zum Zitat Gu, L., Wang, J., Sun, B.B.: Trust management mechanism for internet of things. China Commun. 11(2), 148–156 (2014)CrossRef Gu, L., Wang, J., Sun, B.B.: Trust management mechanism for internet of things. China Commun. 11(2), 148–156 (2014)CrossRef
27.
Zurück zum Zitat Liu, Y.-B., Gong, X.-H., Feng, Y.-F.: Trust systembased on node behavior detection in internet of things. Tongxin Xuebao/J. Commun. 35(5), 8–15 (2014) Liu, Y.-B., Gong, X.-H., Feng, Y.-F.: Trust systembased on node behavior detection in internet of things. Tongxin Xuebao/J. Commun. 35(5), 8–15 (2014)
28.
Zurück zum Zitat Singh, J., Bacon, J., Eyers, D.: Policy enforcement within emerging distributed, event-based systems. In: DEBS 2014—Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, pp. 246–255 (2014) Singh, J., Bacon, J., Eyers, D.: Policy enforcement within emerging distributed, event-based systems. In: DEBS 2014—Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, pp. 246–255 (2014)
29.
Zurück zum Zitat Neisse, R., Steri, G., Baldini, G.: Enforcement of security policy rules for the internet of things. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp. 120–127 (2014) Neisse, R., Steri, G., Baldini, G.: Enforcement of security policy rules for the internet of things. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp. 120–127 (2014)
30.
Zurück zum Zitat Ferreira, H., De Sousa Jr, R., De Deus, F., Canedo, E.: Proposal of a secure, deployable and transparent middleware for internet of things. In: Iberian Conference on Information Systems and Technologies. CISTI, Barcelona, pp. 1–4 (2014) Ferreira, H., De Sousa Jr, R., De Deus, F., Canedo, E.: Proposal of a secure, deployable and transparent middleware for internet of things. In: Iberian Conference on Information Systems and Technologies. CISTI, Barcelona, pp. 1–4 (2014)
31.
Zurück zum Zitat Niu, B., Zhu, X., Chi, H., Li, H.: Privacy and authentication protocol for mobile RFID systems. Wireless Pers. Commun. 77(3), 1713–1731 (2014)CrossRef Niu, B., Zhu, X., Chi, H., Li, H.: Privacy and authentication protocol for mobile RFID systems. Wireless Pers. Commun. 77(3), 1713–1731 (2014)CrossRef
32.
Zurück zum Zitat Jeong, Y.-S., Lee, J., Lee, J.-B., Jung, J.-J., Park, J.: An efficient and secure m-IPS scheme of mobile devices for human-centric computing. J. Appl. Math. 2014, 1–8 (2014) Jeong, Y.-S., Lee, J., Lee, J.-B., Jung, J.-J., Park, J.: An efficient and secure m-IPS scheme of mobile devices for human-centric computing. J. Appl. Math. 2014, 1–8 (2014)
33.
Zurück zum Zitat Geng, J., Xiong, X.: Research on mobile information access based on internet of things. Appl. Mech. Mater. 539, 460–463 (2014)CrossRef Geng, J., Xiong, X.: Research on mobile information access based on internet of things. Appl. Mech. Mater. 539, 460–463 (2014)CrossRef
34.
Zurück zum Zitat Kubler, S., Frmling, K., Buda, A.: A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mobile Comput. 20, 100–114 (2014)CrossRef Kubler, S., Frmling, K., Buda, A.: A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mobile Comput. 20, 100–114 (2014)CrossRef
35.
Zurück zum Zitat Daubert, J., Wiesmaier, A., Kikiras, P.: A view on privacy & trust in IoT. In: IOT/CPS-Security Workshop, IEEE International Conference on Communications, ICC 2015, London, GB, June 08–12, 2015, page to appear. IEEE (2015) Daubert, J., Wiesmaier, A., Kikiras, P.: A view on privacy & trust in IoT. In: IOT/CPS-Security Workshop, IEEE International Conference on Communications, ICC 2015, London, GB, June 08–12, 2015, page to appear. IEEE (2015)
36.
Zurück zum Zitat Bhattacharjya, A., Zhong, X., Wang, J.: Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA. In: Proceedings of the International Conference on Internet of Things and Cloud Computing (ICC 2016) ISBN 978-1-4503-4063-2/16/03. The Møller Centre-Churchill College, Cambridge (2016). https://doi.org/10.1145/2896387.2896431 Bhattacharjya, A., Zhong, X., Wang, J.: Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA. In: Proceedings of the International Conference on Internet of Things and Cloud Computing (ICC 2016) ISBN 978-1-4503-4063-2/16/03. The Møller Centre-Churchill College, Cambridge (2016). https://​doi.​org/​10.​1145/​2896387.​2896431
38.
Zurück zum Zitat Bhattacharjya, A., Zhong, X., Wang, J., et al.: On mapping of address and port using translation (MAP-T). Abstract Published in Int. J. Info Comput. Secur. 11(3), 214–232 (2019)CrossRef Bhattacharjya, A., Zhong, X., Wang, J., et al.: On mapping of address and port using translation (MAP-T). Abstract Published in Int. J. Info Comput. Secur. 11(3), 214–232 (2019)CrossRef
39.
Zurück zum Zitat Sicari, S., Rizzardi, A., Cappiello, C., Coen-Porisini, A.: A NFP model for internet of things applications. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp. 164–171 (2014) Sicari, S., Rizzardi, A., Cappiello, C., Coen-Porisini, A.: A NFP model for internet of things applications. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp. 164–171 (2014)
40.
Zurück zum Zitat Wang, X., Zhang, J., Schooler, E., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, NSW, pp. 725–730 (2014) Wang, X., Zhang, J., Schooler, E., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, NSW, pp. 725–730 (2014)
41.
Zurück zum Zitat Su, J., Cao, D., Zhao, B., Wang, X., You, I.: ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Futur. Gener. Comput. Syst. 33, 11–18 (2014)CrossRef Su, J., Cao, D., Zhao, B., Wang, X., You, I.: ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Futur. Gener. Comput. Syst. 33, 11–18 (2014)CrossRef
42.
Zurück zum Zitat Gòmez-Goiri, A., Orduna, P., Diego, J., de Ipina, D.L.: Otsopack: lightweight framework for interoperable ambient intelligence applications. Comput. Hum. Behav. 30, 460–467 (2014)CrossRef Gòmez-Goiri, A., Orduna, P., Diego, J., de Ipina, D.L.: Otsopack: lightweight framework for interoperable ambient intelligence applications. Comput. Hum. Behav. 30, 460–467 (2014)CrossRef
43.
Zurück zum Zitat Colistra, G., Pilloni, V., Atzori, L.: The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)CrossRef Colistra, G., Pilloni, V., Atzori, L.: The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)CrossRef
44.
Zurück zum Zitat Wang, Y., Qiao, M., Tang, H., Pei, H.: Middleware development method for internet of things. Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J Liaoning Tech Univ (Nat Sci Ed) 33(5), 675–678 (2014) Wang, Y., Qiao, M., Tang, H., Pei, H.: Middleware development method for internet of things. Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J Liaoning Tech Univ (Nat Sci Ed) 33(5), 675–678 (2014)
45.
Zurück zum Zitat Bhattacharjya, A., Zhong, X., Wang, J.: HYBRID RSA based highly efficient, reliable and strong personal Full Mesh Networked messaging scheme. Int. J. Info Comput. Secur. 10(4), 418–436 (2018)CrossRef Bhattacharjya, A., Zhong, X., Wang, J.: HYBRID RSA based highly efficient, reliable and strong personal Full Mesh Networked messaging scheme. Int. J. Info Comput. Secur. 10(4), 418–436 (2018)CrossRef
46.
Zurück zum Zitat Bhattacharjya, A., Zhong, X., Wang, J., et al.: Security challenges and concerns of internet of things (IoT), Cyber-Physical System: Architecture, Security and Application. EAI/Springer Innovations in Communications and Computing, 153–185 (2019) Bhattacharjya, A., Zhong, X., Wang, J., et al.: Security challenges and concerns of internet of things (IoT), Cyber-Physical System: Architecture, Security and Application. EAI/Springer Innovations in Communications and Computing, 153–185 (2019)
Metadaten
Titel
CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP
verfasst von
Aniruddha Bhattacharjya
Xiaofeng Zhong
Jing Wang
Xing Li
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-18732-3_9

Neuer Inhalt