ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

被引:30
|
作者
Majumder, Suman [1 ]
Ray, Sangram [1 ]
Sadhukhan, Dipanwita [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur 492010, Madhya Pradesh, India
关键词
Internet of Things (IoT); Elliptic curve cryptography (ECC); Constraint application protocol (CoAP); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; ARCHITECTURE; SECURITY;
D O I
10.1007/s11277-020-07769-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure.
引用
收藏
页码:1867 / 1896
页数:30
相关论文
共 50 条
  • [41] Efficient implementation of elliptic curve cryptography (ECC) on embedded media processors
    Hu, Y
    Li, Q
    Huang, L
    Kuo, CCJ
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2004, PTS 1 AND 2, 2004, 5308 : 132 - 143
  • [42] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Guoliang Liu
    Huichuan Zhang
    Fanyue Kong
    Lei Zhang
    Wireless Personal Communications, 2018, 101 : 1445 - 1455
  • [43] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Liu, Guoliang
    Zhang, Huichuan
    Kong, Fanyue
    Zhang, Lei
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1445 - 1455
  • [44] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [45] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [46] Expander graphs based on GRH with an application to elliptic curve cryptography
    Jao, David
    Miller, Stephen D.
    Venkatesan, Ramarathnam
    JOURNAL OF NUMBER THEORY, 2009, 129 (06) : 1491 - 1504
  • [47] Ensuring Interoperability for the Internet of Things: Experience with CoAP Protocol Testing
    Chen, Nanxing
    Viho, Cesar
    Baire, Anthony
    Huang, Xiaohong
    Zha, Jiexi
    AUTOMATIKA, 2013, 54 (04) : 448 - 458
  • [48] Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks
    De Rango, Floriano
    Potrino, Giuseppe
    Tropea, Mauro
    Fazio, Peppino
    PERVASIVE AND MOBILE COMPUTING, 2020, 61
  • [49] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [50] An Energy-Efficient Dual-Field Elliptic Curve Cryptography Processor for Internet of Things Applications
    Yeh, Ling-Yu
    Chen, Po-Jen
    Pai, Chen-Chun
    Liu, Tsung-Te
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (09) : 1614 - 1618