Security analysis of the constrained application protocol in the Internet of Things

55Citations
Citations of this article
111Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The concept of Internet of Things involves huge number of constrained devices such as wireless sensors to communicate in a machine-to-machine pattern. Based on the implementation scenario, such communication might take place over a public network such as the Internet, which is based on the TCP/IP stack. However, different research working groups argue that some of these stack protocols such as the Hyper Text Transfer Protocol (HTTP) might not be suitable for constrained devices. Therefore, the IETF Constrained RESTful Environments (CoRE) WG has proposed the Constrained Application Protocol (CoAP); an application layer protocol for constrained devices in the IoTs. The CoRE WG proposed using IPSec or DTLS to secure the CoAP communication at different levels of the protocol stack. However, to investigate the feasibility of such a proposal, we use the X.805 security standard to analyze the security aspects of such implementation. The analysis highlights the main security drawbacks and hence argues of the need for a new integrated security solution. © 2013 IEEE.

Author supplied keywords

Cite

CITATION STYLE

APA

Alghamdi, T. A., Lasebae, A., & Aiash, M. (2013). Security analysis of the constrained application protocol in the Internet of Things. In 2nd International Conference on Future Generation Communication Technologies, FGCT 2013 (pp. 163–168). IEEE Computer Society. https://doi.org/10.1109/FGCT.2013.6767217

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free