Abstract

Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to the Internet, thereby making smart and convenient daily life. Although users' daily lives can be convenient due to various smart services utilizing IoT, it can also be a target of attack through the Internet. Thus, security has now been recognized as mandatory technology to activate IoT based smart service. Several standard organizations related to IoT technologies recommend using the CoAP over DTLS protocol stacks for enabling secure communications between resource constrained things. In general DTLS, a cipher suite required to support specific security service should be negotiated between the CoAP client and server in the process of performing the DTLS handshake protocol. However, the handshake requires too much processing and transmission overhead in constrained IoT environment. To improve such an issue, this paper proposes a secure but efficient scheme for resource constrained things. The proposed scheme can selectively apply application data encryption or integrity to the DTLS record layer during an on-going secure session, thereby reducing the burden of DTLS handshake in resource constrained Internet of Things.

Highlights

  • Smart services of information and communication technology (ICT) have been developed actively in various industrial sectors and much attention has been paid to the Internet of Things (IoT) technology as core technology of new growth engine [1]

  • Users’ daily lives can be convenient due to various smart services such as smart home, smart car, and smart factory based on connecting things, it can be a target of attack through the Internet and secondary security threat using the leaked information is increasing

  • The “TLS PSK WITH NULL SHA256” cipher suite that provides data integrity function during the Datagram Transport Layer Security (DTLS) handshake protocol process between Constrained Application Protocol (CoAP) client and server can be optionally selected and only data integrity function can be provided for CoAP messages

Read more

Summary

Introduction

Smart services of information and communication technology (ICT) have been developed actively in various industrial sectors and much attention has been paid to the Internet of Things (IoT) technology as core technology of new growth engine [1]. When the IoT technology is applied to daily life objects, the number of devices exchanging information through the Internet will increase significantly. Users’ daily lives can be convenient due to various smart services such as smart home, smart car, and smart factory based on connecting things, it can be a target of attack through the Internet and secondary security threat using the leaked information is increasing. A temperature control device sold by a company in the USA controls indoor temperature based on user’s indoor movements to use power efficiently If such information is leaked due to security vulnerability, it can infringe personal privacy and incur physical intrusion. This paper proposes an efficient scheme that can selectively apply application data encryption (i.e., confidentiality) or integrity to the DTLS record layer during an on-going secure session.

Preliminary
Problem Statement
Proposed Scheme
Implementation and Evaluation
F Support function Epoch
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.