An Overview of Security in CoAP: Attack and Analysis

被引:8
|
作者
Arvind, S. [1 ]
Narayanan, V. Anantha [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
关键词
Internet of Things (IoT); Constrained Application Protocol (CoAP); Datagram Transport Layer Security (DTLS); User Datagram Protocol (UDP); Denial of Service (DoS) attacks; Man-In-The-Middle attack; proxy; DESIGN;
D O I
10.1109/icaccs.2019.8728533
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the last decade, a technology called Internet of Things (IoT) has been evolving at a rapid pace. It enables the development of endless applications in view of availability of affordable components which provide smart ecosystems. The IoT devices are constrained devices which are connected to the internet and perform sensing tasks. Each device is identified by their unique address and also makes use of the Constrained Application Protocol (CoAP) as one of the main web transfer protocols. It is an application layer protocol which does not maintain secure channels to transfer information. For authentication and end-to-end security, Datagram Transport Layer Security (DTLS) is one of the possible approaches to boost the security aspect of CoAP, in addition to which there are many suggested ways to protect the transmission of sensitive information. CoAP uses DTLS as a secure protocol and UDP as a transfer protocol. Therefore, the attacks on UDP or DTLS could be assigned as a CoAP attack An attack on DTLS could possibly be launched in a single session and a strong authentication mechanism is needed. Man-In-The-Middle attack is one the peak security issues in CoAP as cited by Request For Comments(RFC) 7252, which encompasses attacks like Sniffing, Spoofing, Denial of Service (DoS), Hijacking, Cross-Protocol attacks and other attacks including Replay attacks and Relay attacks. In this work, a client-server architecture is setup, whose end devices communicate using CoAP. Also, a proxy system was installed across the client side to launch an active interception between the client and the server. The work will further be enhanced to provide solutions to mitigate these attacks.
引用
收藏
页码:655 / 660
页数:6
相关论文
共 50 条
  • [31] A comparative cost/security analysis of fault attack countermeasures
    Malkin, Tal G.
    Standaert, Francois-Xavier
    Yungi, Moti
    FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 159 - 172
  • [32] Vulnerability Analysis for Simultaneous Attack in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2017 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2017,
  • [33] Compressing Network Attack Surfaces for Practical Security Analysis
    Everson, Douglas
    Cheng, Long
    2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 23 - 29
  • [34] Variability meets Security Quantitative Security Modeling and Analysis of Highly Customizable Attack Scenarios
    Ter Beek, Maurice H.
    Legay, Axel
    Lafuente, Alberto Lluch
    Vandin, Andrea
    PROCEEDINGS OF THE 14TH INTERNATIONAL WORKING CONFERENCE ON VARIABILITY MODELLING OF SOFTWARE-INTENSIVE SYSTEMS (VAMOS '20), 2020,
  • [35] Evaluating CoAP end to end Security for Constrained Wireless Sensor Networks
    Fournaris, Apostolos P.
    Giannoulis, Spilios
    Koulamas, Christos
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [36] A Security Approach for CoAP-based Internet of Things Resource Discovery
    Khalil, Kasem
    Elgazzar, Khalid
    Abdelgawad, Ahmed
    Bayoumi, Magdy
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [37] An Overview on Delegated Authorization for CoAP Authentication and Authorization for Constrained Environments (ACE)
    Beltran, Victoria
    Skarmeta, Antonio F.
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 706 - 710
  • [38] CoAP plus DTLS: A Comprehensive Overview of Cryptographic Performance on an IOT Scenario
    Westphall, Johann
    Loffi, Leandro
    Westphall, Carla Merkle
    Martina, Jean Everson
    2020 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS 2020), 2020,
  • [39] Quantitative security and safety analysis with attack-fault trees
    Kumar, Rajesh
    Stoelinga, Marielle
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, : 25 - 32
  • [40] Researches on network security situation analysis based on attack states
    Lv, Huiying
    Cao, Yuanda
    Shi, Cuixia
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 640 - 646