Abstract
In the world of Internet of Things (IoT), huge number of resource constrained devices are directly accessible over the Internet. For allowing the constrained devices to exchange information, the IETF standard group has specified the CoAP which works on top of UDP/IP. Also, Datagram TLS (DTLS) binding is recommended to make the CoAP secure. When DTLS is enabled, a device can select one of three security modes that are PreSharedKey, RawPublicKey and Certificate mode. Especially, the RawPublicKey mode, which uses an asymmetric-key pair without a certificate, is mandatory to implement CoAP over DTLS. But there are several challenges in using the asymmetric-key based secure mode in resource constrained device. This paper compares the RawPublicKey mode and the PreSharedKey mode, which uses a symmetric-key, to discuss DTLS performance in resource constrained devices and networks. For the comparison, we implemented an experimental environment based on IEEE 802.15.4 wireless networks consisting of resource constrained devices in the Cooja Simulator and in the real test-bed as well. Then we analyze the comparison results with regard to code size, energy consumption and processing and receiving time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. IETF. RFC 5246 (2008)
Bormann, C., Ersue, M., Keranen, A.: Terminology for Constrained-Node Networks. IETF. RFC 7228 (2014)
Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). IETF. RFC 7252 (2014)
Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. IETF. RFC 6347 (2012)
Swetina, J., Lu, G., Jacobs, P., Ennesser, F., Jaeseung, S.: Toward a standardized common m2 m service layer platform: Introduction to onem2 m. Wirel. Commun. IEEE 21(3), 20–26 (2014)
oneM2M specifications. http://www.onem2m.org/technical/published-documents
Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: IEEE 37th Conference Local Computer Networks Workshops, pp. 956–963 (2012)
Granjal, J., Monteiro, E., Silva, J.S.: A framework towards adaptable and delegated end-to-end transport-layer security for Internet-integrated Wireless Sensor Networks. In: 2nd Joint ERCIM eMobility and MobiSense Workshop, p. 34 (2013)
Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based internet of things. In: Sensing, Communication, and Networking, Eleventh Annual IEEE International Conference, pp. 284–292 (2014)
Vucinic, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., Guizzetti, R.: OSCAR: Object security architecture for the Internet of Things. Ad Hoc Netw. 11, 2724–2737 (2014)
Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: Lightweight secure CoAP for the internet of things. Sens. J. IEEE 13(10), 3711–3720 (2013)
Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. IETF. RFC 6282 (2011)
Transport Layer Security (TLS) Parameters. http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml
Dunkels, A., Eriksson, J., Finne, N., Tsiftes, N.: Powertrace: Network-level power profiling for low-powerwireless networks. SICS Technical Report T2011:05, ISSN 1100-3154 (2011)
Acknowledgement
This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-H8501-15-1008) supervised by the IITP(Institute for Information & communications Technology Promotion). Also, this research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (no. 2014R1A1A2056961).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kwon, H., Park, J., Kang, N. (2016). Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-31875-2_22
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31874-5
Online ISBN: 978-3-319-31875-2
eBook Packages: Computer ScienceComputer Science (R0)