2022
DOI: 10.32604/csse.2022.020888
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

Abstract: Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in inter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Complex and large payload transfer can have devastating impact on data transfer messaging protocols namely Constrained Application Protocol (CoAP) [68,69], MQ Telemetry Transport (MQTT) [70][71][72], Extensible Messaging and Presence Protocol (XMPP) [73,74], Advanced Message Queuing Protocol (AMQP) [75], and HTTP [76,77] Anomaly can trigger latency in constant and real-time data transfers. It is crucial to minimize data packet latency and inefficiency without compromising on reliability.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…Complex and large payload transfer can have devastating impact on data transfer messaging protocols namely Constrained Application Protocol (CoAP) [68,69], MQ Telemetry Transport (MQTT) [70][71][72], Extensible Messaging and Presence Protocol (XMPP) [73,74], Advanced Message Queuing Protocol (AMQP) [75], and HTTP [76,77] Anomaly can trigger latency in constant and real-time data transfers. It is crucial to minimize data packet latency and inefficiency without compromising on reliability.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…Based on the analysis results of the security assessment model, we propose a lightweight two-way authentication mechanism between Z-Wave controller and S2 device. In order to avoid additional communication overhead, minimal modification of the protocol is required to meet resource-constrained IoT devices [22][23][24][25][26]. The scheme uses only two handshake messages to complete the mutual authentication between devices.…”
Section: Improvements To the Z-wave Protocolmentioning
confidence: 99%
“…In [34], a single pixel tracking system is proposed for the microfluidic device monitoring without image processing. Other related works also include [35][36][37], which considers the secure management of smart devices. However, both of them focus on the security in smart device management and lack device tracking.…”
Section: Introductionmentioning
confidence: 99%