ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

  • PDF / 2,261,975 Bytes
  • 30 Pages / 439.37 x 666.142 pts Page_size
  • 9 Downloads / 313 Views

DOWNLOAD

REPORT


ECC‑CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things Suman Majumder1 · Sangram Ray1 · Dipanwita Sadhukhan1 · Muhammad Khurram Khan2 · Mou Dasgupta3

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on Representational State Transfer architecture. The CoAP is associated with Datagram Transport Layer Security (DTLS) protocol for establishing a secure session using the existing algorithms like Lightweight Establishment of Secure Session for communication between various IoT devices and remote server. However, several limitations regarding the key management, session establishment and multi-cast message communication within the DTLS layer are present in CoAP. Hence, development of an efficient protocol for secure session establishment of CoAP is required for IoT communication. Thus, to overcome the existing limitations related to key management and multicast security in CoAP, we have proposed an efficient and secure communication scheme to establish secure session key between IoT devices and remote server using lightweight elliptic curve cryptography (ECC). The proposed ECC-based CoAP is referred to as ECC-CoAP that provides a CoAP implementation for authentication in IoT network. A number of well-known cryptographic attacks are analyzed for validating the security strength of the ECC-CoAP and found that all these attacks are well defended. The performance analysis of the ECC-CoAP shows that our scheme is lightweight and secure. Keywords  Internet of Things (IoT) · Elliptic curve cryptography (ECC) · Constraint application protocol (CoAP)

1 Introduction Internet of Things and CoAP: Internet of Things (IoT) is an infrastructure of the connected smart objects like—sensor(s), actuator(s), RFID Tags, tiny microprocessor(s), communication device(s), power source(s) etc. called things which are connected through * Sangram Ray [email protected] Extended author information available on the last page of the article

13

Vol.:(0123456789)



S. Majumder et al.

wireless (IEEE 802.15.4, WiFi, Bluetooth Low Energy, Internet, cellular communication etc.) or wired connection for data communication [1–4]. The term ‘Internet of Things’ was initially recommended by Kevin Ashton in the year 1999 [3]. It is a global dynamic network infrastructure with self-configuring capabilities and supported by various protocols used in communication [1, 2]. IoT uses unique addressing schemes where IoT devices are able to interact with each other for common goals [2, 3]. In this regard, IPv6 is used to provide a unique IP address to each IoT device in the network [1, 3, 5]. For the nonIP situation, ZigBee, Z-Wave etc. are used for setti