Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP

被引:3
|
作者
Buschsieweke, Marian [1 ]
Guenes, Mesut [1 ]
机构
[1] Otto von Guericke Univ, Fac Comp Sci, Commun & Networked Syst ComSys, Univ Pl 2, D-39106 Magdeburg, Germany
关键词
D O I
10.1109/PIMRC.2017.8292352
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Both access control and interoperability with the legacy Internet are crucial for broad adoption of technologies in the IoT. While research has addressed both independently, as of now, no solution for interoperable access control is available. To address this need, adoption of the widely supported HTTP Digest Access Authentication [RFC 7616] for CoAP is proposed. A reference implementation was developed, which was used to experimentally verify the suitability of the proposed access control for deployment on constrained wireless nodes. Our evaluation shows that this proposal provides out of the box access to CoAP resources with secure end-to-end authentication from HTTP clients by deploying an appropriate cross-protocol proxy. We have shown that the overhead in terms of processing time was negligible, and in terms of message size could be reduced in our benchmark by up to 87.8% compared to the textual encoding specified in RFC 7616.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Lightweight Internet of Things Device Authentication, Encryption, and Key Distribution Using End-to-End Neural Cryptosystems
    Sun, Yingnan
    Lo, Frank P-W
    Lo, Benny
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14978 - 14987
  • [22] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [23] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [24] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [25] End-to-End Authentication in Under-Water Sensor Networks
    Souza, Evaldo
    Wong, Hao Chi
    Cunha, Italo
    Loureiro, A. A. F.
    Vieira, L. F. M.
    Oliveira, Leonardo B.
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [26] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [27] Efficient end-to-end authentication protocol for wearable health monitoring systems
    Jiang, Qi
    Ma, Jianfeng
    Yang, Chao
    Ma, Xindi
    Shen, Jian
    Chaudhry, Shehzad Ashraf
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 182 - 195
  • [28] End-to-End Deep Multi-Modal Physiological Authentication With Smartbands
    Ekiz, Deniz
    Can, Yekta Said
    Dardagan, Yagmur Ceren
    Aydar, Furkan
    Kose, Rukiye Dilruba
    Ersoy, Cem
    IEEE SENSORS JOURNAL, 2021, 21 (13) : 14977 - 14986
  • [29] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [30] End-to-end security protocol for mobile communications with end-user identification/authentication
    Chang, CC
    Chen, KL
    Hwang, MS
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 28 (02) : 95 - 106