ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

被引:30
|
作者
Majumder, Suman [1 ]
Ray, Sangram [1 ]
Sadhukhan, Dipanwita [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur 492010, Madhya Pradesh, India
关键词
Internet of Things (IoT); Elliptic curve cryptography (ECC); Constraint application protocol (CoAP); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; ARCHITECTURE; SECURITY;
D O I
10.1007/s11277-020-07769-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.
引用
收藏
页码:1867 / 1896
页数:30
相关论文
共 50 条
  • [1] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Suman Majumder
    Sangram Ray
    Dipanwita Sadhukhan
    Muhammad Khurram Khan
    Mou Dasgupta
    Wireless Personal Communications, 2021, 116 : 1867 - 1896
  • [2] Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography
    Albalas, Firas
    Al-Soud, Majd
    Almomani, Omar
    Almomani, Ammar
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (3A) : 550 - 558
  • [3] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [4] Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things
    Shen Guicheng
    Yu Zhen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 452 - 455
  • [5] BSD-based Elliptic Curve Cryptography for the Open Internet of Things
    Pinol, Oriol Pinol
    Raza, Shahid
    Eriksson, Joakim
    Voigt, Thiemo
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [6] Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
  • [7] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998
  • [8] Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
    Zhao, Xingwen
    Li, Dexin
    Li, Hui
    SENSORS, 2022, 22 (19)
  • [9] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [10] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539