An Overview of Security in CoAP: Attack and Analysis

被引:8
|
作者
Arvind, S. [1 ]
Narayanan, V. Anantha [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
关键词
Internet of Things (IoT); Constrained Application Protocol (CoAP); Datagram Transport Layer Security (DTLS); User Datagram Protocol (UDP); Denial of Service (DoS) attacks; Man-In-The-Middle attack; proxy; DESIGN;
D O I
10.1109/icaccs.2019.8728533
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the last decade, a technology called Internet of Things (IoT) has been evolving at a rapid pace. It enables the development of endless applications in view of availability of affordable components which provide smart ecosystems. The IoT devices are constrained devices which are connected to the internet and perform sensing tasks. Each device is identified by their unique address and also makes use of the Constrained Application Protocol (CoAP) as one of the main web transfer protocols. It is an application layer protocol which does not maintain secure channels to transfer information. For authentication and end-to-end security, Datagram Transport Layer Security (DTLS) is one of the possible approaches to boost the security aspect of CoAP, in addition to which there are many suggested ways to protect the transmission of sensitive information. CoAP uses DTLS as a secure protocol and UDP as a transfer protocol. Therefore, the attacks on UDP or DTLS could be assigned as a CoAP attack An attack on DTLS could possibly be launched in a single session and a strong authentication mechanism is needed. Man-In-The-Middle attack is one the peak security issues in CoAP as cited by Request For Comments(RFC) 7252, which encompasses attacks like Sniffing, Spoofing, Denial of Service (DoS), Hijacking, Cross-Protocol attacks and other attacks including Replay attacks and Relay attacks. In this work, a client-server architecture is setup, whose end devices communicate using CoAP. Also, a proxy system was installed across the client side to launch an active interception between the client and the server. The work will further be enhanced to provide solutions to mitigate these attacks.
引用
收藏
页码:655 / 660
页数:6
相关论文
共 50 条
  • [21] An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
    Cetinkaya, Ahmet
    Ishii, Hideaki
    Hayakawa, Tomohisa
    ENTROPY, 2019, 21 (02)
  • [22] Performance evaluation of CoAP and MQTT with security support for IoT environments
    Seoane, Victor
    Garcia-Rubio, Carlos
    Almenares, Florina
    Campo, Celeste
    COMPUTER NETWORKS, 2021, 197
  • [23] Analysis of QUIC Transported CoAP
    Herrero R.
    SN Computer Science, 2021, 2 (2)
  • [24] Network Security Situation Analysis Aimed at Distributed Attack
    Fu Yanming
    Chen Wen
    Li Lin
    Pan Yanxian
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1005 - +
  • [25] EIP Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities
    Tang, Xueyan
    Du, Yuying
    Wang, Zhengyang
    Chong, Shawn
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1239 - 1244
  • [26] Analytical Approach to Attack Graph Analysis for Network Security
    Kijsanayothin, Phongphun
    Hewett, Rattikorn
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
  • [27] Security Analysis of IoT Systems Using Attack Trees
    Beaulaton, Delphine
    Said, Najah Ben
    Cristescu, Ioana
    Sadou, Salah
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 68 - 94
  • [28] Open Platform for Attack and Countermeasure Analysis on System Security
    Bal, Ozgun
    Koca, Mutlu
    Anarim, Emin
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [29] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
  • [30] Power Analysis Attack: A Vulnerability to Smart Card Security
    Mahanta, Hridoy Jyoti
    Azad, Abul Kalam
    Khan, Ajoy Kumar
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 506 - 510