Open Access
Subscription Access
Reliable and Secure Traffic Exchange Approach for Internet of Things (IoT) Devices
Recently, Internet of Things (IoT) has become one of the most developing network environments. Enhancement in electronic and microcontrollers has resulted into increasing number of electric devices which are connected to the internet. Therefore, secure data exchange between IoT devices and other systems is required to prevent any attempts of attacks which can lead to dangerous consequences. Authentication is a critical stage for an efficient security level. IoT device has constrained neither resources which require a lightweight mechanism that neither consumes power nor resources. Thus, in this paper, a novel authentication mechanism for IoT networks has been proposed. This mechanism mainly depends on Elliptic Curve Cryptography (ECC) algorithm over the Constrained Application Protocol (CoAP). The proposed authentication approach provides an efficient authentication mechanism with a high level of security. Implementing ECC algorithm of small key of the light weight web protocol CoAP can minimize the computation and energy resource with powerful security features.
Keywords
IoT, Authentication, CoAP, ECC.
User
Font Size
Information
- M. A. Azzawi, R. Hassan, and K. A. A. Bakar, "A Review on Internet of Things (IoT) in Healthcare," International Journal of Applied Engineering Research, vol. 11, pp. 10216-10221, 2016.
- L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, pp. 2787-2805, 2010.
- Y. Liu and G. Zhou, "Key technologies and applications of internet of things," in Intelligent Computation Technology and Automation (ICICTA), 2012 Fifth International Conference on, 2012, pp. 197-200.
- R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, et al., "Hypertext transfer protocol--HTTP/1.1," ed: RFC 2616, June, 1999.
- M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco, G. Boggia, et al., "Standardized protocol stack for the internet of (important) things," Communications Surveys & Tutorials, IEEE, vol. 15, pp. 1389-1406, 2013.
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "Two-phase authentication protocol for wireless sensor networks in distributed IoT applications," in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, 2014, pp. 2728-2733.
- S. R. Moosavi, T. N. Gia, A.-M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho, et al., "SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways," Procedia Computer Science, vol. 52, pp. 452-459, 2015.
- L. Barreto, A. Celesti, M. Villari, M. Fazio, and A. Puliafito, "An Authentication Model for IoT Clouds," in Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, 2015, pp. 1032-1035.
- J.-c. YANG, P. Hao, and X. ZHANG, "Enhanced mutual authentication model of IoT," The Journal of China Universities of Posts and Telecommunications, vol. 20, pp. 69-74, 2013.
- S. Peng, "An Id-based Multiple Authentication scheme against attacks in wireless sensor networks," in 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012, pp. 1042-1045.
- T. D. Nguyen and E.-N. Huh, "A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems," Int. Arab J. Inf. Technol., vol. 9, pp. 511-519, 2012.
- P. N. Mahalle, N. R. Prasad, and R. Prasad, "Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on, 2014, pp. 1-5.
- S. Kalra and S. K. Sood, "Secure authentication scheme for IoT and cloud servers," Pervasive and Mobile Computing, vol. 24, pp. 210-223, 2015.
- M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu, "A robust authentication scheme for observing resources in the internet of things environment," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, 2014, pp. 205-211.
- S. Emerson, Y.-K. Choi, D.-Y. Hwang, K.-S. Kim, and K.-H. Kim, "An OAuth based authentication mechanism for IoT networks," in Information and Communication Technology Convergence (ICTC), 2015 International Conference on, 2015, pp. 1072-1074.
- A. Sehgal, "Using the Contiki Cooja Simulator," Computer Science, Jacobs University Bremen Campus Ring, vol. 1, p. 28759, 2013.
- A. Dunkels, B. Gronvall, and T. Voigt, "Contiki-a lightweight and flexible operating system for tiny networked sensors," in Local Computer Networks, 2004. 29th Annual IEEE International Conference on, 2004, pp. 455-462.
- W. Zolertia, "platform, Z1 Datasheet," ed.
- M. Corporaton, "Tmote Sky: Datasheet," ed, 2006.
- Hartke, K., & Bergmann, O. (2012). Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls01 (work in progress).
- Vucinic, M., Tourancheau, B., Watteyne, T., Rousseau, F., Duda, A., Guizzetti, R., & Damon, L. (2015). DTLS Performance in Duty-Cycled Networks. arXiv preprint arXiv:1507.05810.
- StrĂ¼be, M., Lukas, F., & Kapitza, R. (2012). Demo Abstract: CoojaTrace, Extensive Profiling for WSNs. Paper presented at the Poster and Demo Proc. of the 9th European Conf. on Wireless Sensor Networks (EWSN 2012).
- A. S. Ahmed, R. Hassan, and N. E. Othman, "Security threats for IPv6 transition strategies: A review," in Engineering Technology and Technopreneuship (ICE2T), 2014 4th International Conference on, 2014, pp. 83-88.
Abstract Views: 224
PDF Views: 1