Skip to main content

Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments

  • Conference paper
Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

Abstract

In the world of Internet of Things (IoT), huge number of resource constrained devices are directly accessible over the Internet. For allowing the constrained devices to exchange information, the IETF standard group has specified the CoAP which works on top of UDP/IP. Also, Datagram TLS (DTLS) binding is recommended to make the CoAP secure. When DTLS is enabled, a device can select one of three security modes that are PreSharedKey, RawPublicKey and Certificate mode. Especially, the RawPublicKey mode, which uses an asymmetric-key pair without a certificate, is mandatory to implement CoAP over DTLS. But there are several challenges in using the asymmetric-key based secure mode in resource constrained device. This paper compares the RawPublicKey mode and the PreSharedKey mode, which uses a symmetric-key, to discuss DTLS performance in resource constrained devices and networks. For the comparison, we implemented an experimental environment based on IEEE 802.15.4 wireless networks consisting of resource constrained devices in the Cooja Simulator and in the real test-bed as well. Then we analyze the comparison results with regard to code size, energy consumption and processing and receiving time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)

    Article  Google Scholar 

  2. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. IETF. RFC 5246 (2008)

    Google Scholar 

  3. Bormann, C., Ersue, M., Keranen, A.: Terminology for Constrained-Node Networks. IETF. RFC 7228 (2014)

    Google Scholar 

  4. Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). IETF. RFC 7252 (2014)

    Google Scholar 

  5. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. IETF. RFC 6347 (2012)

    Google Scholar 

  6. Swetina, J., Lu, G., Jacobs, P., Ennesser, F., Jaeseung, S.: Toward a standardized common m2 m service layer platform: Introduction to onem2 m. Wirel. Commun. IEEE 21(3), 20–26 (2014)

    Article  Google Scholar 

  7. oneM2M specifications. http://www.onem2m.org/technical/published-documents

  8. Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: IEEE 37th Conference Local Computer Networks Workshops, pp. 956–963 (2012)

    Google Scholar 

  9. Granjal, J., Monteiro, E., Silva, J.S.: A framework towards adaptable and delegated end-to-end transport-layer security for Internet-integrated Wireless Sensor Networks. In: 2nd Joint ERCIM eMobility and MobiSense Workshop, p. 34 (2013)

    Google Scholar 

  10. Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based internet of things. In: Sensing, Communication, and Networking, Eleventh Annual IEEE International Conference, pp. 284–292 (2014)

    Google Scholar 

  11. Vucinic, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., Guizzetti, R.: OSCAR: Object security architecture for the Internet of Things. Ad Hoc Netw. 11, 2724–2737 (2014)

    Google Scholar 

  12. Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: Lightweight secure CoAP for the internet of things. Sens. J. IEEE 13(10), 3711–3720 (2013)

    Article  Google Scholar 

  13. Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. IETF. RFC 6282 (2011)

    Google Scholar 

  14. Transport Layer Security (TLS) Parameters. http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml

  15. Dunkels, A., Eriksson, J., Finne, N., Tsiftes, N.: Powertrace: Network-level power profiling for low-powerwireless networks. SICS Technical Report T2011:05, ISSN 1100-3154 (2011)

    Google Scholar 

Download references

Acknowledgement

This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-H8501-15-1008) supervised by the IITP(Institute for Information & communications Technology Promotion). Also, this research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (no. 2014R1A1A2056961).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Namhi Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kwon, H., Park, J., Kang, N. (2016). Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_22

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics