TY - GEN
T1 - A Security Approach for CoAP-based Internet of Things Resource Discovery
AU - Khalil, Kasem
AU - Elgazzar, Khalid
AU - Abdelgawad, Ahmed
AU - Bayoumi, Magdy
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - The growth of the Internet of Thing (IoT) results in an expanded attack that requires end-to-end security techniques. IoT applications involve in a business-oriented such as insurance and banking, and mission-critical crisis such as e-health and intelligent transportation systems. One of the most protocols commonly used for resource discovery in IoT is the Constrained Application Protocol (CoAP) protocol which fits the constrained devices. There is a need for security support in CoAP for the IoT environment. This paper presents a security approach using TACACS+ to strengthen the security of CoAP. The proposed security mechanism separately supports access control, authentication, and accounting. It has been implemented using a mobile phone and a Raspberry Pi. The mobile phone is used as a client, and the Raspberry Pi is used as a server. The implementation composes of a TI SensorTag and a WeMo switch that are used as resources. This paper, also, presents performance indexes of the security technique in terms of CPU usage, time computation, latency, energy consumption, and traffic exchange between a client and a server. The experimental results show the proposed method is compatible with IoT devices.
AB - The growth of the Internet of Thing (IoT) results in an expanded attack that requires end-to-end security techniques. IoT applications involve in a business-oriented such as insurance and banking, and mission-critical crisis such as e-health and intelligent transportation systems. One of the most protocols commonly used for resource discovery in IoT is the Constrained Application Protocol (CoAP) protocol which fits the constrained devices. There is a need for security support in CoAP for the IoT environment. This paper presents a security approach using TACACS+ to strengthen the security of CoAP. The proposed security mechanism separately supports access control, authentication, and accounting. It has been implemented using a mobile phone and a Raspberry Pi. The mobile phone is used as a client, and the Raspberry Pi is used as a server. The implementation composes of a TI SensorTag and a WeMo switch that are used as resources. This paper, also, presents performance indexes of the security technique in terms of CPU usage, time computation, latency, energy consumption, and traffic exchange between a client and a server. The experimental results show the proposed method is compatible with IoT devices.
KW - CoAP protocol
KW - Internet of Thing
KW - IoT security
KW - Resource Discovery
KW - TACACS+
UR - http://www.scopus.com/inward/record.url?scp=85095574603&partnerID=8YFLogxK
U2 - 10.1109/WF-IoT48130.2020.9221153
DO - 10.1109/WF-IoT48130.2020.9221153
M3 - Conference contribution
AN - SCOPUS:85095574603
T3 - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
BT - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 2 June 2020 through 16 June 2020
ER -