ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

被引:30
|
作者
Majumder, Suman [1 ]
Ray, Sangram [1 ]
Sadhukhan, Dipanwita [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur 492010, Madhya Pradesh, India
关键词
Internet of Things (IoT); Elliptic curve cryptography (ECC); Constraint application protocol (CoAP); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; ARCHITECTURE; SECURITY;
D O I
10.1007/s11277-020-07769-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.
引用
收藏
页码:1867 / 1896
页数:30
相关论文
共 50 条
  • [31] Securing CoAP Through Payload Encryption: Using Elliptic Curve Cryptography
    Harish, M.
    Karthick, R.
    Rajan, R. Mohan
    Vetriselvi, V.
    ICCCE 2018, 2019, 500 : 497 - 511
  • [32] Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things
    Liu, Zhe
    Grossschadl, Johann
    Hu, Zhi
    Jarvinen, Kimmo
    Wang, Husen
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (05) : 773 - 785
  • [33] Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
    Rathee, Geetanjali
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 42 - 52
  • [34] Cryptanalysis and improvement of a user authentication scheme for internet of things using elliptic curve cryptography
    Bayat, Majid
    Atashgah, Mohammad Beheshti
    Barari, Morteza
    Aref, Mohammad Reza
    International Journal of Network Security, 2019, 21 (06): : 897 - 911
  • [35] An Efficient Hardware Design of CoAP Protocol for The Internet of Things
    Khalil, Kasem
    Mohaidat, Tamador
    Darwich, Mahmoud
    Kumar, Ashok
    Bayoumi, Magdy
    17TH IEEE DALLAS CIRCUITS AND SYSTEMS CONFERENCE, DCAS 2024, 2024,
  • [36] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [37] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [38] Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
    Gong, Xiang
    Feng, Tao
    SENSORS, 2022, 22 (19)
  • [39] Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
    Preethi, Preethi
    Ulla, Mohammed Mujeer
    Yadav, G. Praveen Kumar
    Roy, Kumar Sekhar
    Hazarika, Ruhul Amin
    Saxena, K. Kuldeep
    JOURNAL OF ENGINEERING, 2024, 2024
  • [40] An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
    He, Debiao
    Zeadally, Sherali
    IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01): : 72 - 83