首页 | 本学科首页   官方微博 | 高级检索  
     


ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
Authors:Majumder  Suman  Ray  Sangram  Sadhukhan  Dipanwita  Khan  Muhammad Khurram  Dasgupta  Mou
Affiliation:1.Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, 737139, India
;2.Center of Excellence in Information Assurance, College of Computer & Information Sciences, King Saud University, Riyadh, 11653, Kingdom of Saudi Arabia
;3.Department of Computer Application, National Institute of Technology Raipur, Raipur, 492010, India
;
Abstract:

Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号