Skip to main content

2023 | OriginalPaper | Buchkapitel

Secure CoAP Application Layer Protocol for the Internet of Things Using Hermitian Curves

verfasst von : Raja Masadeh, Omar Almomani, Esra Masadeh, Ra’ed Masa’deh

Erschienen in: The Effect of Information Technology on Business and Marketing Intelligence Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is a modern technology that allows devices to sense status and take suitable reactions without human interference; this leads machines to interact directly with another machine, called machine to machine (m2m) communication. Many network technologies were involved in making the IoT idea work well. Devices in IoT are connected through the wireless network. Thus, different protocols on different network layers are used in IoT. One of the primary routing protocols used on the application layer is Constrained Application Protocol (CoAP) which is a new web application transfer protocol. Where it is better suited to constrained environments than HTTP for IoT. In this study, Hermitian-based Cryptosystem (HBC) is applied on the CoAP protocol in order to increase the security of IoT. The Hermitian curve is an algebraic geometric curve capable of generating a vast number of points. Simulation results are presented, showing significant performance improvements of AG codes over Hermitian codes against Reed-Solomon (RS) codes and Elliptic Curve Cryptography (ECC). This study proved that HBC outperformed the RS and ECC in terms of several points and key length, which leads to increase security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Alghamdi, T. A., Lasebae, A., & Aiash, M. (2013). Security analysis of the constrained application protocol in the Internet of Things. In Future Generation Communication Technology (FGCT), 2013 Second International Conference (pp. 163–168). IEEE. Alghamdi, T. A., Lasebae, A., & Aiash, M. (2013). Security analysis of the constrained application protocol in the Internet of Things. In Future Generation Communication Technology (FGCT), 2013 Second International Conference (pp. 163–168). IEEE.
Zurück zum Zitat Alzaqebah, A., Al-Sayyed, R., & Masadeh, R. (2019). Task scheduling based on modified grey wolf optimizer in cloud computing environment. In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS) (pp. 1–6). IEEE. Alzaqebah, A., Al-Sayyed, R., & Masadeh, R. (2019). Task scheduling based on modified grey wolf optimizer in cloud computing environment. In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS) (pp. 1–6). IEEE.
Zurück zum Zitat Alzubi, O. A. (2015, September). Performance Evaluation of AG Block Turbo Codes over Fading Channels Using BPSK. In Proceedings of the The International Conference on Engineering & MIS 2015 (p. 36). ACM. Alzubi, O. A. (2015, September). Performance Evaluation of AG Block Turbo Codes over Fading Channels Using BPSK. In Proceedings of the The International Conference on Engineering & MIS 2015 (p. 36). ACM.
Zurück zum Zitat Alzubi, O. A., Chen, T. M., Alzubi, J. A., Rashaideh, H., & Al-Najdawi, N. (2016). Secure channel coding schemes based on algebraic-geometric codes over hermitian curves. Journal of Universal Computer Science, 22(4), 552–566.MathSciNet Alzubi, O. A., Chen, T. M., Alzubi, J. A., Rashaideh, H., & Al-Najdawi, N. (2016). Secure channel coding schemes based on algebraic-geometric codes over hermitian curves. Journal of Universal Computer Science, 22(4), 552–566.MathSciNet
Zurück zum Zitat Asif, R. A. (2016). Efficient computation for hyper elliptic curve based cryptography. University of Windsor. Asif, R. A. (2016). Efficient computation for hyper elliptic curve based cryptography. University of Windsor.
Zurück zum Zitat Bhattacharyya, A., Bose, T., Bandyopadhyay, S., Ukil, A., & Pal, A. (2015). LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption. In Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on (pp. 682–687). IEEE. Bhattacharyya, A., Bose, T., Bandyopadhyay, S., Ukil, A., & Pal, A. (2015). LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption. In Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on (pp. 682–687). IEEE.
Zurück zum Zitat Blake, I., Heegard, C., Hoholdt, T., & Wei, V. (1998). Algebraic-geometry codes. IEEE Transactions on Information Theory, 44(6), 2596–2618.MathSciNetCrossRefMATH Blake, I., Heegard, C., Hoholdt, T., & Wei, V. (1998). Algebraic-geometry codes. IEEE Transactions on Information Theory, 44(6), 2596–2618.MathSciNetCrossRefMATH
Zurück zum Zitat Brachmann, M., Garcia-Morchon, O., & Kirsche, M. (2011). Security for practical coap applications: Issues and solution approaches. Universitt Stuttgart. Brachmann, M., Garcia-Morchon, O., & Kirsche, M. (2011). Security for practical coap applications: Issues and solution approaches. Universitt Stuttgart.
Zurück zum Zitat Carrasco, R. A., & Johnston, M. (2008). Non-binary error control coding for wireless communication and data storage. John Wiley & Sons.CrossRef Carrasco, R. A., & Johnston, M. (2008). Non-binary error control coding for wireless communication and data storage. John Wiley & Sons.CrossRef
Zurück zum Zitat Evans, D. (2011). The internet of things how the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group (IBSG). Evans, D. (2011). The internet of things how the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group (IBSG).
Zurück zum Zitat Ganesan, R., Gobi, M., & Vivekanandan, K. (2008). Elliptic and hyper elliptic curve cryptography over finite field Fp. Manager’s Journal on Software Engineering, 3(2), 43. Ganesan, R., Gobi, M., & Vivekanandan, K. (2008). Elliptic and hyper elliptic curve cryptography over finite field Fp. Manager’s Journal on Software Engineering, 3(2), 43.
Zurück zum Zitat Hart, J. K., & Martinez, K. (2015). Toward an environmental Internet of Things. Earth and Space Science, 2(5), 194–200.CrossRef Hart, J. K., & Martinez, K. (2015). Toward an environmental Internet of Things. Earth and Space Science, 2(5), 194–200.CrossRef
Zurück zum Zitat Johnston, M., & Carrasco, R. A. (2005). Construction and performance of algebraic–geometric codes over AWGN and fading channels. IEE Proceedings-Communications, 152(5), 713–722.CrossRef Johnston, M., & Carrasco, R. A. (2005). Construction and performance of algebraic–geometric codes over AWGN and fading channels. IEE Proceedings-Communications, 152(5), 713–722.CrossRef
Zurück zum Zitat Kalyani, V., Gaur, P., & Vats, S. (2015). IoT:’machine to machine’application A future vision. Journal of Management Engineering and Information Technology (JMEIT), 2(4), 15–20. Kalyani, V., Gaur, P., & Vats, S. (2015). IoT:’machine to machine’application A future vision. Journal of Management Engineering and Information Technology (JMEIT), 2(4), 15–20.
Zurück zum Zitat Kerasiotis, F., Prayati, A., Antonopoulos, C., Koulamas, C., & Papadopoulos, G. (2010). Battery lifetime prediction model for a WSN platform. In 2010 Fourth International Conference on Sensor Technologies and Applications (pp. 525–530). IEEE. Kerasiotis, F., Prayati, A., Antonopoulos, C., Koulamas, C., & Papadopoulos, G. (2010). Battery lifetime prediction model for a WSN platform. In 2010 Fourth International Conference on Sensor Technologies and Applications (pp. 525–530). IEEE.
Zurück zum Zitat Kothmayr, T. (2011). A security architecture for wireless sensor networks based on DTLS. Master's Thesis in the Software Engineering Elite Graduate Program at the University of Augsburg. Kothmayr, T. (2011). A security architecture for wireless sensor networks based on DTLS. Master's Thesis in the Software Engineering Elite Graduate Program at the University of Augsburg.
Zurück zum Zitat Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, 11(8), 2710–2723.CrossRef Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, 11(8), 2710–2723.CrossRef
Zurück zum Zitat Kovatsch, M., Duquennoy, S., & Dunkels, A. (2011). A low-power CoAP for Contiki. In Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on (pp. 855–860). IEEE. Kovatsch, M., Duquennoy, S., & Dunkels, A. (2011). A low-power CoAP for Contiki. In Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on (pp. 855–860). IEEE.
Zurück zum Zitat Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. RFC, 4919, 10. Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. RFC, 4919, 10.
Zurück zum Zitat Lee, K., & O’Sullivan, M. E. (2010). Algebraic soft-decision decoding of Hermitian codes. IEEE Transactions on Information Theory, 56(6), 2587–2600.MathSciNetCrossRefMATH Lee, K., & O’Sullivan, M. E. (2010). Algebraic soft-decision decoding of Hermitian codes. IEEE Transactions on Information Theory, 56(6), 2587–2600.MathSciNetCrossRefMATH
Zurück zum Zitat Levä, T., Mazhelis, O., & Suomi, H. (2014). Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications. Decision Support Systems, 63, 23–38.CrossRef Levä, T., Mazhelis, O., & Suomi, H. (2014). Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications. Decision Support Systems, 63, 23–38.CrossRef
Zurück zum Zitat Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea lion optimization algorithm. Sea, 10(5), 388. Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea lion optimization algorithm. Sea, 10(5), 388.
Zurück zum Zitat Mohammad, M. A. (2017). “Cryptosystem design based on hermitian curves” (dissertation), Al-Balqa Applied University. Mohammad, M. A. (2017). “Cryptosystem design based on hermitian curves” (dissertation), Al-Balqa Applied University.
Zurück zum Zitat Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure CoAP for the internet of things. IEEE Sensors Journal, 13(10), 3711–3720.CrossRef Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure CoAP for the internet of things. IEEE Sensors Journal, 13(10), 3711–3720.CrossRef
Zurück zum Zitat Raza, S., Trabalza, D., & Voigt, T. (2012). 6LoWPAN compressed DTLS for CoAP. In 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (pp. 287–289). IEEE. Raza, S., Trabalza, D., & Voigt, T. (2012). 6LoWPAN compressed DTLS for CoAP. In 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (pp. 287–289). IEEE.
Zurück zum Zitat Rovi, C., & Izquierdo, M., Maximal curves covered by the Hermitian curve. Rovi, C., & Izquierdo, M., Maximal curves covered by the Hermitian curve.
Zurück zum Zitat Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP). Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP).
Zurück zum Zitat Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications, 10(4), 372–392.CrossRef Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications, 10(4), 372–392.CrossRef
Zurück zum Zitat Yassein, M. B., & Aljawarneh, S. (2017). A new elastic trickle timer algorithm for Internet of Things. Journal of Network and Computer Applications, 89, 38–47.CrossRef Yassein, M. B., & Aljawarneh, S. (2017). A new elastic trickle timer algorithm for Internet of Things. Journal of Network and Computer Applications, 89, 38–47.CrossRef
Zurück zum Zitat Yassein, M. B., Aljawarneh, S., & Ghaleb, B. (2016). A new dynamic trickle algorithm for low power and lossy networks. In 2016 International Conference on Engineering & MIS (ICEMIS) (pp. 1–6). IEEE. Yassein, M. B., Aljawarneh, S., & Ghaleb, B. (2016). A new dynamic trickle algorithm for low power and lossy networks. In 2016 International Conference on Engineering & MIS (ICEMIS) (pp. 1–6). IEEE.
Metadaten
Titel
Secure CoAP Application Layer Protocol for the Internet of Things Using Hermitian Curves
verfasst von
Raja Masadeh
Omar Almomani
Esra Masadeh
Ra’ed Masa’deh
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-12382-5_102

Premium Partner