Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP

被引:3
|
作者
Buschsieweke, Marian [1 ]
Guenes, Mesut [1 ]
机构
[1] Otto von Guericke Univ, Fac Comp Sci, Commun & Networked Syst ComSys, Univ Pl 2, D-39106 Magdeburg, Germany
关键词
D O I
10.1109/PIMRC.2017.8292352
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Both access control and interoperability with the legacy Internet are crucial for broad adoption of technologies in the IoT. While research has addressed both independently, as of now, no solution for interoperable access control is available. To address this need, adoption of the widely supported HTTP Digest Access Authentication [RFC 7616] for CoAP is proposed. A reference implementation was developed, which was used to experimentally verify the suitability of the proposed access control for deployment on constrained wireless nodes. Our evaluation shows that this proposal provides out of the box access to CoAP resources with secure end-to-end authentication from HTTP clients by deploying an appropriate cross-protocol proxy. We have shown that the overhead in terms of processing time was negligible, and in terms of message size could be reduced in our benchmark by up to 87.8% compared to the textual encoding specified in RFC 7616.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
    Chin-Chen Chang
    Kuo-Lun Chen
    Min-Shiang Hwang
    Wireless Personal Communications, 2004, 28 : 95 - 106
  • [32] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [33] Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication
    Kumar, Gulshan
    Saha, Rahul
    Rai, Mritunjay Kumar
    Kim, Tai-Hoon
    IEEE ACCESS, 2018, 6 : 46558 - 46567
  • [34] End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations
    Hammad, Mohamed
    Iliyasu, Abdullah M.
    Elgendy, Ibrahim A.
    Abd El-Latif, Ahmed A.
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [35] End-to-End CNN conceptual model for a biometric authentication mechanism for ATM machines
    Karthikeyan Velayuthapandian
    Natchiyar Murugan
    Saranya Paramasivan
    Discover Electronics, 1 (1):
  • [36] Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems
    Deng, Robert H.
    Yang, Yanjiang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 284 - +
  • [37] A decentralized scalable security framework for end-to-end authentication of future IoT communication
    Sheron, P. S. Febin
    Sridhar, K. P.
    Baskar, S.
    Shakeel, P. Mohamed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12)
  • [38] A Collaborative PHY-Aided Technique For End-to-End IoT Device Authentication
    Hao, Peng
    Wang, Xianbin
    Shen, Weiming
    IEEE ACCESS, 2018, 6 : 42279 - 42293
  • [39] AuthLoop: Practical End-to-End Cryptographic Authentication for Telephony over Voice Channels
    Reaves, Bradley
    Blue, Logan
    Traynor, Patrick
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 963 - 978
  • [40] An End-to-End Convolutional Neural Network for ECG-Based Biometric Authentication
    Pinto, Joao Ribeiro
    Cardoso, Jaime S.
    2019 IEEE 10TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2019,