An Overview of Security in CoAP: Attack and Analysis

被引:8
|
作者
Arvind, S. [1 ]
Narayanan, V. Anantha [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
关键词
Internet of Things (IoT); Constrained Application Protocol (CoAP); Datagram Transport Layer Security (DTLS); User Datagram Protocol (UDP); Denial of Service (DoS) attacks; Man-In-The-Middle attack; proxy; DESIGN;
D O I
10.1109/icaccs.2019.8728533
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Over the last decade, a technology called Internet of Things (IoT) has been evolving at a rapid pace. It enables the development of endless applications in view of availability of affordable components which provide smart ecosystems. The IoT devices are constrained devices which are connected to the internet and perform sensing tasks. Each device is identified by their unique address and also makes use of the Constrained Application Protocol (CoAP) as one of the main web transfer protocols. It is an application layer protocol which does not maintain secure channels to transfer information. For authentication and end-to-end security, Datagram Transport Layer Security (DTLS) is one of the possible approaches to boost the security aspect of CoAP, in addition to which there are many suggested ways to protect the transmission of sensitive information. CoAP uses DTLS as a secure protocol and UDP as a transfer protocol. Therefore, the attacks on UDP or DTLS could be assigned as a CoAP attack An attack on DTLS could possibly be launched in a single session and a strong authentication mechanism is needed. Man-In-The-Middle attack is one the peak security issues in CoAP as cited by Request For Comments(RFC) 7252, which encompasses attacks like Sniffing, Spoofing, Denial of Service (DoS), Hijacking, Cross-Protocol attacks and other attacks including Replay attacks and Relay attacks. In this work, a client-server architecture is setup, whose end devices communicate using CoAP. Also, a proxy system was installed across the client side to launch an active interception between the client and the server. The work will further be enhanced to provide solutions to mitigate these attacks.
引用
收藏
页码:655 / 660
页数:6
相关论文
共 50 条
  • [41] HASN:A Hierarchical Attack Surface Network for System Security Analysis
    Kangyu Huang
    Lin Yang
    Renfang Fu
    Shengli Zhou
    Zheng Hong
    中国通信, 2019, 16 (05) : 137 - 157
  • [42] Internet of healthcare things security vulnerabilities and jamming attack analysis
    Sharma, Kavita
    EXPERT SYSTEMS, 2022, 39 (03)
  • [43] HASN: A Hierarchical Attack Surface Network for System Security Analysis
    Huang, Kangyu
    Yang, Lin
    Fu, Renfang
    Zhou, Shengli
    Hong, Zheng
    CHINA COMMUNICATIONS, 2019, 16 (05) : 137 - 157
  • [44] Analysis and visualization of large complex attack graphs for networks security
    Chen, Hongda
    Chen, Genshe
    Blasch, Erik
    Kruger, Martin
    Sityar, Irma
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
  • [45] AoT - Attack on Things: A security analysis of IoT firmware updates
    Ibrahim, Muhammad
    Continella, Andrea
    Bianchi, Antonio
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 1047 - 1064
  • [46] Analysis of Complex Networks for Security Issues using Attack Graph
    Musa, Tanvirali
    Yeo, Kheng Cher
    Azam, Sarni
    Shanmugam, Bharanidharan
    Karim, Asif
    De Boer, Friso
    Nur, Fernaz Narin
    Faisal, Fahad
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [47] Parallel and Distributed Normalization of Security Events for Instant Attack Analysis
    Jaeger, David
    Sapegin, Andrey
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [48] Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting
    Ye, Congcong
    Li, Guoqiang
    Cai, Hongming
    Gu, Yonggen
    Fukuda, Akira
    2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 15 - 24
  • [49] Security Analysis of DoS Attack against the LTE-A System
    Cao, Wei
    Ma, Nan
    Zhang, Ping
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1287 - 1292
  • [50] Attacks on ML Systems: From Security Analysis to Attack Mitigation
    Zou, Qingtian
    Zhang, Lan
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 119 - 138