Date of Publication :31st December 2017
Abstract: The interest in Internet of Things (IoT) has been increased. The IoT can be used to exchange information between people and physical devices or between devices and devices. For constrained IoT network environments, the lightweight application protocols have recently been proposed, is Constrained Application Protocol (CoAP) However, this protocols still have the scalability problem in the network with a large number of sensors. DTLS does not support multi-cast messages in group communications. In this case, the proxy can translate from HTTP to CoAP, but the proxy has to decide if it is a multi-cast or uni- cast message. A robust key management process provides a solution for all protocols including CoAP. However, in the case, key management can help in solving the multi-cast message issue within the DTLS and to ensure security In this paper, we propose a simple extension of CoAP using a clustering approach, in which a set of CoAP sensors are grouped into a cluster, and a cluster head is used for message aggregation and transmission for the sensors associated with the cluster. And also, key management is a basic security mechanism for IoT, but is still a challenging issue in IoT. While several key management schemes have been proposed for IoT networks, it is still a challenging issue in these networks. Secure key management is one of the issues attracting researchers’ attention in terms of energy consumption and processing load on sensor nodes, as well as security problems. Due to storage limit in these networks, scalability is one of the most important components discussed in key management. In this paper, we also propose a scalable key management scheme based on clustering for IoT networks in CoAP.
Reference :
-
- Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. and Ayyash, M., 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), pp.2347-2376
- Yang, Y., Wu, L., Yin, G., Li, L. and Zhao, H., 2017. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal.
- Keoh, S.L., Kumar, S.S. and Tschofenig, H., 2014. Securing the internet of things: A standardization perspective. IEEE Internet of Things Journal, 1(3), pp.265-275.
- Rahman, R.A. and Shah, B., 2016, March. Security analysis of IoT protocols: A focus in CoAP. In Big Data and Smart City (ICBDSC), 2016 3rd MEC International Conference on (pp. 1-7). IEEE.
- Raza, S., Seitz, L., Sitenkov, D. and Selander, G., 2016. S3K: Scalable Security with Symmetric Keys— DTLS Key Establishment for the Internet of Things. IEEE Transactions on Automation Science and Engineering, 13(3), pp.1270-1280.
- Zhang, Y., Shen, Y. and Lee, S., 2010, April. A cluster-based group key management scheme for wireless sensor networks. In Web Conference (APWEB), 2010 12th International Asia-Pacific (pp. 386-388). IEEE.
- Karagiannis, V., Chatzimisios, P., VazquezGallego, F. and Alonso-Zarate, J., 2015. A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), pp.11-17.