Access Control Mechanism for Secure CoAP Applications Based on DTLS

Vol. 27, No. 6, pp. 1307-1315, Dec. 2017
10.13089/JKIISC.2017.27.6.1307, Full Text:
Keywords: DTLS, CoAP, IoT, DTLS, IoT, CoAP
Abstract

While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. Jeong and C. Park, "Access Control Mechanism for Secure CoAP Applications Based on DTLS," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 6, pp. 1307-1315, 2017. DOI: 10.13089/JKIISC.2017.27.6.1307.

[ACM Style]
Yeon-seong Jeong and Chang-seop Park. 2017. Access Control Mechanism for Secure CoAP Applications Based on DTLS. Journal of The Korea Institute of Information Security and Cryptology, 27, 6, (2017), 1307-1315. DOI: 10.13089/JKIISC.2017.27.6.1307.