Publication | Closed Access
Security analysis of the constrained application protocol in the Internet of Things
75
Citations
7
References
2013
Year
Unknown Venue
Hardware SecurityEngineeringInformation SecurityIot CommunicationSecurity AnalysisSecurityIot ProtocolIot SecurityInternet Of ThingsLightweight ProtocolConstrained Application ProtocolCoap CommunicationSecure ProtocolConstrained DevicesCore WgData SecurityCryptography
The concept of Internet of Things involves huge number of constrained devices such as wireless sensors to communicate in a machine-to-machine pattern. Based on the implementation scenario, such communication might take place over a public network such as the Internet, which is based on the TCP/IP stack. However, different research working groups argue that some of these stack protocols such as the Hyper Text Transfer Protocol (HTTP) might not be suitable for constrained devices. Therefore, the IETF Constrained RESTful Environments (CoRE) WG has proposed the Constrained Application Protocol (CoAP); an application layer protocol for constrained devices in the IoTs. The CoRE WG proposed using IPSec or DTLS to secure the CoAP communication at different levels of the protocol stack. However, to investigate the feasibility of such a proposal, we use the X.805 security standard to analyze the security aspects of such implementation. The analysis highlights the main security drawbacks and hence argues of the need for a new integrated security solution.
| Year | Citations | |
|---|---|---|
Page 1
Page 1