CISUC

End-to-end transport-layer security for Internet- integrated sensing applications with mutual and delegated ECC public-key authentication

Authors

Abstract

The Internet of Things (IoT) describes a vision of a future Internet where constrained sensing and actuating devices are part of distributed applications and required to support standard Internet communications with more powerful devices or Internet hosts. This vision will require appropriate end-to-end communications and security mechanisms that are well suited to the constraints and characteristics of sensing devices and applications, while being able to support standard Internet communication mechanisms. With this motivation in mind, we propose an architecture supporting low-power end-to-end transport-layer secure communications with mutual authentication using ECC public-key cryptography for Internet- integrated sensing applications. The proposed architecture promotes the availability of critical resources on constrained sensing platforms and security against Internet-originated threats, while providing full compatibility with current standardization proposals. Those are fundamental enabling factors of most of the sensing applications envisioned for the IoT and, as far as we known, ours is the first architecture implemented and experimentally evaluated with such goals.

Keywords

Internet of Things, CoAP , DTLS, mutual authentication, delegated ECC public-key authentication

Subject

Internet of Things, Security

Conference

IFIP Networking 2013 Conference, May 2013

PDF File


Cited by

Year 2015 : 4 citations

 Capossele, Angelo, et al. "Security as a CoAP resource: an optimized DTLS implementation for the IoT." Proceedings of ICC 2015, IEEE (2015).

 Vu?ini?, Mališa, et al. "OSCAR." Ad Hoc Networks 32.C (2015): 3-16.

 Kalra, Sheetal, and Sandeep K. Sood. "Secure authentication scheme for IoT and cloud servers." Pervasive and Mobile Computing 24 (2015): 210-223.

 Nguyen, Kim Thuat, Maryline Laurent, and Nouha Oualha. "Survey on secure communication protocols for the Internet of Things." Ad Hoc Networks (2015).

Year 2014 : 3 citations

 Hummen, René, et al. "Delegation-based Authentication and Authorization for the IP-based Internet of Things." IEEE SECON. 2014.

 Vu?ini?, Mališa, et al. "OSCAR: Object security architecture for the Internet of Things." Ad Hoc Networks (2014).

 Bojic, Iva, et al. "Communication and Security in Machine-to-Machine Systems." Wireless Networking for Moving Objects. Springer International Publishing, 2014. 255-281.

Year 2013 : 1 citations

 Bojic, Iva, et al. "Communication and Security in Machine-to-Machine Systems."