INDIGO: Secure CoAP for Smartphones
With the inception of 6LoWPAN, it is possible to connect wireless sensor networks (WSN) and smart objects with the Internet using the IPv6 protocol, hence forming the IPv6-based Internet of Things (6IoT). Since the links in the 6IoT are lossy, UDP rather than TCP is mostly used for the communication between things. For the same reason, CoAP, a connection-less variant of HTTP, is being standardized as the web protocol for the 6IoT. Due to the sensitivity of the potential applications and presence of humans in the loop, End-to-End (E2E) security between constrained devices and hosts on Internet is one of the main requirements in the 6IoT. Secure CoAP (CoAPs) is used to provide end-to-end security in the CoAP-based 6IoT.
Smartphones with sensing capabilities, direct human interaction, Internet connectivity, and relatively powerful processing and storage capabilities, are going to be an integral part of the 6IoT. In this paper we design, implement, and evaluate CoAPs for Android powered smartphones. We call our CoAPs INDIGO. To the best of our knowledge this is the first work that provides CoAPs support in smartphones. We implement and evaluate all cryptographic cipher suites proposed in the CoAP protocol, including the certificate-based authentication using Ecliptic Curve Cryptography (ECC). We also present novel application scenarios that are enabled by INDIGO on smartphones.
KeywordsIndigo Cute CALIPSO
Unable to display preview. Download preview PDF.
- 1.Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. RFC 4919 (August 2007)Google Scholar
- 2.Shelby, Z., Kartke, K., Bormann, C., Frank, B.: Constrained Application Protocol (CoAP). draft-ietf-core-coap-12 (October 2012)Google Scholar
- 3.Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282 (September 2011)Google Scholar
- 4.Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550 (March 2012)Google Scholar
- 5.Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. RFC 6347 (Proposed Standard) (January 2012)Google Scholar
- 6.Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (August 2008); Updated by RFCs 5746, 5878, 6176Google Scholar
- 9.Brachmann, M., Garcia-Morchon, O., Kirsche, M.: Security for practical coap applications: Issues and solution approaches. In: Proc. of the 10th GI/ITG KuVS Fachgespraech Sensornetze, FGSN 2011 (2011)Google Scholar
- 10.Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G.: A dtls based end-to-end security architecture for the internet of things with two-way authentication. In: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956–963. IEEE (2012)Google Scholar
- 11.Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN Compressed DTLS for CoAP. In: Proceedings of the 8th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS 2011), Hangzhou, China (May 2012)Google Scholar
- 12.Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6lowpan with compressed ipsec. In: 7th International Conference on Distributed Computing in Sensor Systems (DCOSS 2011), Barcelona, Spain (2011)Google Scholar
- 13.Raza, S., Duquennoy, S., Höglund, J., Roedig, U., Voigt, T.: Secure Communication for the Internet of Things - A Comparison of Link-Layer Security and IPsec for 6LoWPAN. In: Security and Communication Networks. Wiley (January 2012)Google Scholar