ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

被引:30
|
作者
Majumder, Suman [1 ]
Ray, Sangram [1 ]
Sadhukhan, Dipanwita [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur 492010, Madhya Pradesh, India
关键词
Internet of Things (IoT); Elliptic curve cryptography (ECC); Constraint application protocol (CoAP); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; ARCHITECTURE; SECURITY;
D O I
10.1007/s11277-020-07769-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.
引用
收藏
页码:1867 / 1896
页数:30
相关论文
共 50 条
  • [21] RETRACTED: Applicability of Elliptic Curve Cryptography on Internet of Things (Retracted Article)
    Zhao, Guanglei
    Wang, Jingcheng
    Luo, Jian
    Long, Xiao
    Si, Xianping
    2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11
  • [22] ELLIPTIC CURVE CRYPTOGRAPHY FOR CONSTRAINED DEVICES IN INTERNET OF THINGS AND INDUSTRY 4.0
    Cvrcek, Tadeas
    PROCEEDINGS II OF THE 26TH CONFERENCE STUDENT EEICT 2020, 2020, : 48 - 51
  • [23] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [24] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [25] Elliptic curve cryptography on constraint environments
    de Santos, MD
    Sanchez-Avila, C
    Sanchez-Reillo, R
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220
  • [26] Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC) Implementation for MANETs
    Ertaul, Levent
    Chavan, Nitu J.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (04): : 48 - 61
  • [27] Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card
    Bai, T. Daisy Premila
    Raj, K. Michael
    Rabara, S. Albert
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 43 - 46
  • [28] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [29] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [30] Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
    Liu, Zhe
    Seo, Hwajeong
    Castiglione, Aniello
    Choo, Kim-Kwang Raymond
    Kim, Howon
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 521 - 529