Enhancing Security in Internet of Things Environment by Developing an Authentication Mechanism using COAP Protocol (original) (raw)
Related papers
Secure and Efficient CoAP Based Authentication and Access Control for Internet of Things (IoT
—Internet of Things (IoT) is growing as an attractive system paradigm. There is a lot of hype around the internet of things (IoT) and it continues to evolve as we move beyond humans talking to machines. IoT has interconnections through the physical, cyber and social spaces. Things used in IoT are sensors and actuators, mechanical devices and networking includes gateways, wireless infrastructure. Most of devices among them are resource constrained. During the interaction betweendevices,IoTgetssufferedfromseveresecuritychallenges. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So to realize the dream of internet of things secured device to device communication is expected. Security of resource constrained networks becomes prime important. Many existing mechanisms gives security and protection to networks and systems but they are unable to give fine grain access control. In this work, we focused on CoAP based framework to give service level access control on resource constrained devices. It gives fine grain access control on a per service basis. ECDSA is used to improve privacy of the system. Performance of CoAP based framework is compared and analyzed with existing security solutions. Test results are presented which shows that communication overhead and authentication delay are less than the existing system. Hence security performance of system gets improved. The goal is to present comprehensive security framework for low power networks consist of resource constrained devices.
Lightweight security scheme for IoT applications using CoAP
International Journal of Pervasive Computing and Communications, 2014
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.
A lightweight secure CoAP for IoT-cloud paradigm using Elliptic-curve cryptography
Indonesian Journal of Electrical Engineering and Computer Science, 2020
Cloud Computing and the Internet of Things (IoT), two different technologies, are already part of our lives. Their impressive adoption increasing more and more, which makes them the future of the future internet. The tsunami of interconnectivity between objects and data collection is increasingly based on Cloud Computing, where data analysis and intelligence really reside. A new paradigm where the Cloud and the IoT are merged will create a new air in the world of technology, which can offer many services and applications useful to humanity. However, despite the great benefits that can bring this technology in term of new services, elasticity and flexibility, the security aspect still remains a serious constraint which hampers the expansion of this technology. This paper proposes a lightweight Mutual authentication protocol based on Constrained Application Protocol (CoAP); that is suitable for IoT devices than HTTP and using elliptic curve cryptography to secure data transmission bet...
International Journal of Safety and Security Engineering
Nowadays, Internet of Things (IoT) is being achieved significant improvement in the scientific community. Both industry and academia are concentrated on the concepts of improving security, maintainability and utility through the improvement and standardization of optimal practices. There are various existing approaches are arisen in the security of IoT, ranging from cryptography to network security for identifying management. Thus, this paper focused on the security due to its impacts of limiting factors to adoption of wider IoT. This paper discusses the survey of various existing approaches suitable for IoT environment in the domain of authentication and authorization. Hence, this survey analyzes various techniques corresponding to authentication and authorization for IoT devices. This study is to utilize 25 research papers concentrated on various techniques and the review of researches technique-wise is to be provided. Finally, the survey will encourage the analysis based on the p...
Review on Security of Internet of Things Authentication Mechanism
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and access control. Additionally, traditional network security cannot be directly used in IoT networks due to its limitations on computational capabilities and storage capacities. Furthermore, authentication is the mainstay of the IoT network, as all components undergo an authentication process before establishing communication. Therefore, securing authentication is essential. In this paper, we have focused on IoT security particularly on their authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication mechanism. Additionally, we discussed existing security verification techniques and evaluation schemes of IoT authentication. Furthermore, analysis against current existing protocols have been discussed in all parts and provided some recommendation. Finally, the aim of our study is to help the future researcher by providing security issues, open challenges and future scopes in IoT authentication.
An Authentication and Access Control Framework for CoAP-based Internet of Things
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, and more and more products are starting to appear on the market. Research has shown that the use of Service Oriented Architecture (SOA) can enable distributed application and devices to device communication, even on very resource constrained devices, and thus play an important role for IoT and CPS.
A Security Approach for CoAP-based Internet of Things Resource Discovery
IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
The growth of the Internet of Thing (IoT) results in an expanded attack that requires end-to-end security techniques. IoT applications involve in a business-oriented such as insurance and banking, and mission-critical crisis such as e-health and intelligent transportation systems. One of the most protocols commonly used for resource discovery in IoT is the Constrained Application Protocol (CoAP) protocol which fits the constrained devices. There is a need for security support in CoAP for the IoT environment. This paper presents a security approach using TACACS+ to strengthen the security of CoAP. The proposed security mechanism separately supports access control, authentication, and accounting. It has been implemented using a mobile phone and a Raspberry Pi. The mobile phone is used as a client, and the Raspberry Pi is used as a server. The implementation composes of a TI SensorTag and a WeMo switch that are used as resources. This paper, also, presents performance indexes of the security technique in terms of CPU usage, time computation, latency, energy consumption, and traffic exchange between a client and a server. The experimental results show the proposed method is compatible with IoT devices.
The Secure Authentication Mechanism to Increase the Security of Iot Devices
2018
The Internet of Things (IoT) states to the use of intelligently connected devices and schemes to leverage data assembled by embedded sensors and actuators in machines and extra physical objects[1]. But the clocks of IoT devices are not well synchronized due which security gets compromised. In this research work, the time lay technique will be proposed which will synchronize the clocks of the IoT devices and also establish secure channel from source to destination for data transmission and thereby improving the security of the network.
New enhanced authentication protocol for Internet of Things
Big Data Mining and Analytics
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user's data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.
AN ANALYSIS OF AUTHENTICATION SCHEMES FOR INTERNET OF THINGS
Advances in communication and information technologies have led to the emergence of Internet of Things (IoT). Internet of Things (IoT) has emerged as one of the most powerful communication paradigms of the 21st century. The radio - frequency identification (RFID) technology is one of the technologies of IoT deployments. To satisfy the security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed. Recently, elliptic curv e cryptography (ECC) - based RFID authentication schemes have attracted a lot of attention. In this paper, we discuss the security requirements of RFID authentication schemes, and present a review of ECC - based RFID authentication schemes in terms of perform ance and security.