Advertisement

INDIGO: Secure CoAP for Smartphones

Enabling E2E Secure Communication in the 6IoT
  • Daniele Trabalza
  • Shahid Raza
  • Thiemo Voigt
Part of the Communications in Computer and Information Science book series (CCIS, volume 366)

Abstract

With the inception of 6LoWPAN, it is possible to connect wireless sensor networks (WSN) and smart objects with the Internet using the IPv6 protocol, hence forming the IPv6-based Internet of Things (6IoT). Since the links in the 6IoT are lossy, UDP rather than TCP is mostly used for the communication between things. For the same reason, CoAP, a connection-less variant of HTTP, is being standardized as the web protocol for the 6IoT. Due to the sensitivity of the potential applications and presence of humans in the loop, End-to-End (E2E) security between constrained devices and hosts on Internet is one of the main requirements in the 6IoT. Secure CoAP (CoAPs) is used to provide end-to-end security in the CoAP-based 6IoT.

Smartphones with sensing capabilities, direct human interaction, Internet connectivity, and relatively powerful processing and storage capabilities, are going to be an integral part of the 6IoT. In this paper we design, implement, and evaluate CoAPs for Android powered smartphones. We call our CoAPs INDIGO. To the best of our knowledge this is the first work that provides CoAPs support in smartphones. We implement and evaluate all cryptographic cipher suites proposed in the CoAP protocol, including the certificate-based authentication using Ecliptic Curve Cryptography (ECC). We also present novel application scenarios that are enabled by INDIGO on smartphones.

Keywords

Transmission Control Protocol Advance Encryption Standard Near Field Communication User Datagram Protocol Smart Object 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. RFC 4919 (August 2007)Google Scholar
  2. 2.
    Shelby, Z., Kartke, K., Bormann, C., Frank, B.: Constrained Application Protocol (CoAP). draft-ietf-core-coap-12 (October 2012)Google Scholar
  3. 3.
    Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282 (September 2011)Google Scholar
  4. 4.
    Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550 (March 2012)Google Scholar
  5. 5.
    Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. RFC 6347 (Proposed Standard) (January 2012)Google Scholar
  6. 6.
    Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (August 2008); Updated by RFCs 5746, 5878, 6176Google Scholar
  7. 7.
    Campbell, A., Eisenman, S., Lane, N., Miluzzo, E., Peterson, R., Lu, H., Zheng, X., Musolesi, M., Fodor, K., Ahn, G.: The rise of people-centric sensing. IEEE Internet Computing 12(4), 12–21 (2008)CrossRefGoogle Scholar
  8. 8.
    Cuff, D., Hansen, M., Kang, J.: Urban sensing: out of the woods. Communications of the ACM 51(3), 24–33 (2008)CrossRefGoogle Scholar
  9. 9.
    Brachmann, M., Garcia-Morchon, O., Kirsche, M.: Security for practical coap applications: Issues and solution approaches. In: Proc. of the 10th GI/ITG KuVS Fachgespraech Sensornetze, FGSN 2011 (2011)Google Scholar
  10. 10.
    Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G.: A dtls based end-to-end security architecture for the internet of things with two-way authentication. In: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956–963. IEEE (2012)Google Scholar
  11. 11.
    Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN Compressed DTLS for CoAP. In: Proceedings of the 8th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS 2011), Hangzhou, China (May 2012)Google Scholar
  12. 12.
    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6lowpan with compressed ipsec. In: 7th International Conference on Distributed Computing in Sensor Systems (DCOSS 2011), Barcelona, Spain (2011)Google Scholar
  13. 13.
    Raza, S., Duquennoy, S., Höglund, J., Roedig, U., Voigt, T.: Secure Communication for the Internet of Things - A Comparison of Link-Layer Security and IPsec for 6LoWPAN. In: Security and Communication Networks. Wiley (January 2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Daniele Trabalza
    • 1
  • Shahid Raza
    • 1
  • Thiemo Voigt
    • 1
    • 2
  1. 1.Swedish Institute of Computer ScienceStockholmSweden
  2. 2.Department of Information TechnologyUppsala UniversitySweden

Personalised recommendations