Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP

被引:3
|
作者
Buschsieweke, Marian [1 ]
Guenes, Mesut [1 ]
机构
[1] Otto von Guericke Univ, Fac Comp Sci, Commun & Networked Syst ComSys, Univ Pl 2, D-39106 Magdeburg, Germany
关键词
D O I
10.1109/PIMRC.2017.8292352
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Both access control and interoperability with the legacy Internet are crucial for broad adoption of technologies in the IoT. While research has addressed both independently, as of now, no solution for interoperable access control is available. To address this need, adoption of the widely supported HTTP Digest Access Authentication [RFC 7616] for CoAP is proposed. A reference implementation was developed, which was used to experimentally verify the suitability of the proposed access control for deployment on constrained wireless nodes. Our evaluation shows that this proposal provides out of the box access to CoAP resources with secure end-to-end authentication from HTTP clients by deploying an appropriate cross-protocol proxy. We have shown that the overhead in terms of processing time was negligible, and in terms of message size could be reduced in our benchmark by up to 87.8% compared to the textual encoding specified in RFC 7616.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] End-to-End Message Authentication Using CoAP Over IoT
    Singhal, Prateek
    Sharma, Puneet
    Hazela, Bramah
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 279 - 288
  • [2] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [3] A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [4] Enabling end-to-end CoAP-based communications for the Web of Things
    Castro, Miguel
    Jara, Antonio J.
    Skarmeta, Antonio F.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 230 - 236
  • [5] Efficient Key Authentication Service for Secure End-to-End Communications
    Etemad, Mohammad
    Kupcu, Alptekin
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 183 - 197
  • [6] END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION
    Sun, Zhuo
    Wu, Hengmiao
    Zhao, Chenglin
    Yue, Gang
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (05) : 88 - 95
  • [7] Quality-optimized and secure end-to-end authentication for media delivery
    Sun, Qibin
    Apostolopoulos, John
    Chen, Chang Wen
    Chang, Shih-Fu
    PROCEEDINGS OF THE IEEE, 2008, 96 (01) : 97 - 111
  • [8] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [9] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [10] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
    Alatawi, Mashari
    Saxena, Nitesh
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201