An Overview of Security in CoAP: Attack and Analysis

被引:8
|
作者
Arvind, S. [1 ]
Narayanan, V. Anantha [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
关键词
Internet of Things (IoT); Constrained Application Protocol (CoAP); Datagram Transport Layer Security (DTLS); User Datagram Protocol (UDP); Denial of Service (DoS) attacks; Man-In-The-Middle attack; proxy; DESIGN;
D O I
10.1109/icaccs.2019.8728533
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the last decade, a technology called Internet of Things (IoT) has been evolving at a rapid pace. It enables the development of endless applications in view of availability of affordable components which provide smart ecosystems. The IoT devices are constrained devices which are connected to the internet and perform sensing tasks. Each device is identified by their unique address and also makes use of the Constrained Application Protocol (CoAP) as one of the main web transfer protocols. It is an application layer protocol which does not maintain secure channels to transfer information. For authentication and end-to-end security, Datagram Transport Layer Security (DTLS) is one of the possible approaches to boost the security aspect of CoAP, in addition to which there are many suggested ways to protect the transmission of sensitive information. CoAP uses DTLS as a secure protocol and UDP as a transfer protocol. Therefore, the attacks on UDP or DTLS could be assigned as a CoAP attack An attack on DTLS could possibly be launched in a single session and a strong authentication mechanism is needed. Man-In-The-Middle attack is one the peak security issues in CoAP as cited by Request For Comments(RFC) 7252, which encompasses attacks like Sniffing, Spoofing, Denial of Service (DoS), Hijacking, Cross-Protocol attacks and other attacks including Replay attacks and Relay attacks. In this work, a client-server architecture is setup, whose end devices communicate using CoAP. Also, a proxy system was installed across the client side to launch an active interception between the client and the server. The work will further be enhanced to provide solutions to mitigate these attacks.
引用
收藏
页码:655 / 660
页数:6
相关论文
共 50 条
  • [1] A Performance Analysis of the Security Communication in CoAP and MQTT
    Laaroussi, Zakaria
    Novo, Oscar
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [2] Security analysis of IoT protocols: A focus in CoAP
    Rahman, Reem Abdul
    Shah, Babar
    2016 3RD MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC), 2016, : 172 - 178
  • [3] Overview of attack and defence tactics on network security
    Sheng, Huanye
    Wang, Jue
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 31 (08): : 82 - 87
  • [4] Stability and Security Analysis with Identification of Attack on Industrial Networked Control System: An Overview
    Solanki, Brijraj S.
    Renu, K.
    Srinivasan, Seshadhri
    INTERNETWORKING INDONESIA, 2019, 11 (02): : 3 - 8
  • [5] CoAP and MQTT: Characteristics and Security
    Ouakasse, Fathia
    Rakrak, Said
    EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 : 157 - 167
  • [6] Security Attack Analysis Using Attack Patterns
    Li, Tong
    Paja, Elda
    Mylopoulos, John
    Horkoff, Jennifer
    Beckers, Kristian
    2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 513 - 525
  • [7] Analysis on Internet Attack and Security
    Chen, Jing
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390
  • [8] An Overview of Blockchain Security Analysis
    Wang, Hai
    Wang, Yong
    Cao, Zigang
    Li, Zhen
    Xiong, Gang
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 55 - 72
  • [9] CubeSat Security Attack Tree Analysis
    Falco, Gregory
    Viswanathan, Arun
    Santangelo, Andrew
    8TH IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY (SMC-IT 2021), 2021, : 68 - 76
  • [10] Security attack analysis of safety systems
    Hansen, Kai
    2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,