Open Access Open Access  Restricted Access Subscription Access

Reliable and Secure Traffic Exchange Approach for Internet of Things (IoT) Devices


Affiliations
1 The National University of Malaysia, Bangi, Selangor, Malaysia
 

Recently, Internet of Things (IoT) has become one of the most developing network environments. Enhancement in electronic and microcontrollers has resulted into increasing number of electric devices which are connected to the internet. Therefore, secure data exchange between IoT devices and other systems is required to prevent any attempts of attacks which can lead to dangerous consequences. Authentication is a critical stage for an efficient security level. IoT device has constrained neither resources which require a lightweight mechanism that neither consumes power nor resources. Thus, in this paper, a novel authentication mechanism for IoT networks has been proposed. This mechanism mainly depends on Elliptic Curve Cryptography (ECC) algorithm over the Constrained Application Protocol (CoAP). The proposed authentication approach provides an efficient authentication mechanism with a high level of security. Implementing ECC algorithm of small key of the light weight web protocol CoAP can minimize the computation and energy resource with powerful security features.

Keywords

IoT, Authentication, CoAP, ECC.
User
Notifications
Font Size


  • Reliable and Secure Traffic Exchange Approach for Internet of Things (IoT) Devices

Abstract Views: 302  |  PDF Views: 1

Authors

Mustafa Abdullah Azzawi
The National University of Malaysia, Bangi, Selangor, Malaysia
Rosilah Hassan
The National University of Malaysia, Bangi, Selangor, Malaysia
Khairul Azmi Abu Bakar
The National University of Malaysia, Bangi, Selangor, Malaysia

Abstract


Recently, Internet of Things (IoT) has become one of the most developing network environments. Enhancement in electronic and microcontrollers has resulted into increasing number of electric devices which are connected to the internet. Therefore, secure data exchange between IoT devices and other systems is required to prevent any attempts of attacks which can lead to dangerous consequences. Authentication is a critical stage for an efficient security level. IoT device has constrained neither resources which require a lightweight mechanism that neither consumes power nor resources. Thus, in this paper, a novel authentication mechanism for IoT networks has been proposed. This mechanism mainly depends on Elliptic Curve Cryptography (ECC) algorithm over the Constrained Application Protocol (CoAP). The proposed authentication approach provides an efficient authentication mechanism with a high level of security. Implementing ECC algorithm of small key of the light weight web protocol CoAP can minimize the computation and energy resource with powerful security features.

Keywords


IoT, Authentication, CoAP, ECC.

References