2019 5th International Conference on Advanced Computing &Amp; Communication Systems (ICACCS) 2019
DOI: 10.1109/icaccs.2019.8728533
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Security in CoAP: Attack and Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…The issue arises from proxies having to decide if the DTLS implementation will be multicast or unicast message. Although security mechanisms have been instigated in COAP [163], still the protocol does suffer from common attacks like:…”
Section: Coapmentioning
confidence: 99%
See 1 more Smart Citation
“…The issue arises from proxies having to decide if the DTLS implementation will be multicast or unicast message. Although security mechanisms have been instigated in COAP [163], still the protocol does suffer from common attacks like:…”
Section: Coapmentioning
confidence: 99%
“…The issue arises from proxies having to decide if the DTLS implementation will be multicast or unicast message. Although security mechanisms have been instigated in COAP [ 163 ], still the protocol does suffer from common attacks like: Parsing attacks, where a node could execute malicious code. Cache attacks, where a proxy server can gain control of a part of the network.…”
Section: Security In Iomt Communication Protocolsmentioning
confidence: 99%
“…The Constrained Application Protocol (CoAP) protocol is designed with resourceconstrained sensors for the IoT application layer [7]. A Datagram TLS (DTLS) is recommended to make the CoAP secure [8]. The DTLS offers authentication, key exchange, and protection of communication between legal entities.…”
Section: Introductionmentioning
confidence: 99%
“…The DTLS/CoAP has to exchange six flight handshake messages between sensors. It fragments the packets into the 127-byte, but it leads to data loss and delays in communication [8,9]. The small packet size increases the number of packets, leading to network traffic due to frequent handshaking and packet loss.…”
Section: Introductionmentioning
confidence: 99%
“…It is a customized and compressed version of HTTP (hypertext transfer protocol). However, CoAP is susceptible to many types of attacks as studied in [7], including but not limited to parsing attacks (where a remote node can be crashed by executing arbitrary code), amplification attacks (an attacker can use end devices to convert small packets into larger packets), and spoofing attacks. This shows how IoT protocols still have many vulnerabilities, and it is becoming increasingly important to protect them against attacks.…”
Section: Introductionmentioning
confidence: 99%