Archive | 2019

End-to-End Message Authentication Using CoAP Over IoT

 
 
 

Abstract


Internet of Things is a new innovative technology topic under a science fiction and imagination or virtual world associated by visualizing physical world. There are conjecture and cybernetic world still possible about it. This is a truly abundant terrain of fantasy and original ideas when the combination of real life and virtual life through IoT. The interconnection of embedded devices, sensors, actuators can communicate the information from one to another (M2M) over Internet and data exchange. The important challenge faced in IoT is security which helps to secure the information through data exchanging, and is known as Web of Things (WoT). Moreover, to perform routing in 6LoWPAN network, RPL uses destination-oriented DAG (DODAG) between the different IPv6 nodes. We can also interface the CoAP and 6LoWPAN through RPL using UDP protocol for various constrained nodes in Contiki OS. In this paper, we focus on the proposed project Constraint Application Protocol (CoAP) that falls under a software component at application layer. The DTLS security based on LESS algorithm is provided under the CoAP protocol and gives the unicast messages because DTLS does not support multicast. The proposed solution to make a multicast message is distributing session key using key distribution centre. This is used to encrypt or decrypt the multicast message and then design and improve the cryptography algorithm. We have implemented this proposed work on the Contiki OS with the framework using Cooja simulator that is an erudite tool to make the work more efficient and optimized it.

Volume None
Pages 279-288
DOI 10.1007/978-981-13-2324-9_28
Language English
Journal None

Full Text