Toward the inclusion of end-to-end security in the OM2M platform
- PDF / 2,756,108 Bytes
- 25 Pages / 439.37 x 666.142 pts Page_size
- 23 Downloads / 190 Views
Toward the inclusion of end‑to‑end security in the OM2M platform Simone Patonico1,2 · Thanh‑Long Nguyen1,2 · Placide Shabisha1,2 · An Braeken1,2 · Kris Steenhaut1,2
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract The exponential growth in the number of Internet of things (IoT) devices and their potential in many applications in a vast number of domains fuelled the development of different IoT platforms, supported by big companies and industry groups. These platforms are able to provide reliable services to IoT devices and reduce the time to market for the targeted applications. Unfortunately, these proprietary solutions fragment the IoT market and hamper horizontal integration. The need to interoperate the different IoT platforms and communication protocols pushed the Standards Developing Organizations (SDOs) to the specification of a machine-to-machine (M2M) service layer, published as the oneM2M (OM2M) standard. Although the OM2M standard provides generic guidelines to implement security solutions which include authentication, authorization, confidentiality and data integrity, more efficient security schemes should be investigated when constrained IoT devices are concerned. This paper presents two main contributions. First, a CoAPS binding for the OM2M platform is provided that enables secure and reliable communication with constrained IoT devices. Second, a lightweight dynamic access control system is designed, developed and integrated in a OM2M-based architecture. It allows to dynamically grant or revoke access permission in an anonymous way to constrained IoT devices for controlling some actuators. From the experimental results, we can conclude that the computational complexity of the proposed security scheme is extremely low for the client device which requests data access. We show that a constrained IoT device establishes a trust relationship with the OM2M server in few seconds. Keywords CoAPS · ECQV · Tinydtls · MicroECC · Scandium · OneM2M · interoperability · Authentication · Authorization
* Simone Patonico [email protected] Extended author information available on the last page of the article
13
Vol.:(0123456789)
S. Patonico et al.
1 Introduction The use of smart devices to improve the efficiency of many applications is now considered a common practice and becoming an ordinary part of many daily activities. The possibility to transmit data in real time and to automate processes attracted many companies which invested considerable amounts of money in the production of Internet of things (IoT) devices and the design of communication platforms and protocols. Groups of companies and big companies such as Google and Apple developed specific IoT platforms for their proprietary IoT devices to enhance the reliability and security of their systems. However, this trend led to an extremely fragmented IoT market where each device could only work with a specific protocol stack. The growing demand for an interoperable solution to enable the communication between proprietary
Data Loading...