Challenges in deploying CoAP over DTLS in resource constrained environments

14Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the world of Internet of Things (IoT), huge number of resource constrained devices are directly accessible over the Internet. For allowing the constrained devices to exchange information, the IETF standard group has specified the CoAP which works on top of UDP/IP. Also, Datagram TLS (DTLS) binding is recommended to make the CoAP secure. When DTLS is enabled, a device can select one of three security modes that are PreSharedKey, RawPublicKey and Certificate mode. Especially, the RawPublicKey mode, which uses an asymmetric-key pair without a certificate, is mandatory to implement CoAP over DTLS. But there are several challenges in using the asymmetric-key based secure mode in resource constrained device. This paper compares the RawPublicKey mode and the PreSharedKey mode, which uses a symmetric-key, to discuss DTLS performance in resource constrained devices and networks. For the comparison, we implemented an experimental environment based on IEEE 802.15.4 wireless networks consisting of resource constrained devices in the Cooja Simulator and in the real test-bed as well. Then we analyze the comparison results with regard to code size, energy consumption and processing and receiving time.

Cite

CITATION STYLE

APA

Kwon, H., Park, J., & Kang, N. (2016). Challenges in deploying CoAP over DTLS in resource constrained environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9503, pp. 269–280). Springer Verlag. https://doi.org/10.1007/978-3-319-31875-2_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free