Security analysis of IoT protocols: A focus in CoAP

Document Type

Conference Proceeding

Source of Publication

2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016

Publication Date

4-26-2016

Abstract

© 2016 IEEE. Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart products or smart things connected to the internet. It is a new and fast developing market which not only connects objects and people but also billions of gadgets and smart devices. With the rapid growth of IoT, there is also a steady increase in security vulnerabilities of the linked objects. For example, a car manufacturer may want to link the systems within a car to smart home network networks to increase sales, but if all the various people involved do not embrace security the system will be exposed to security risks. As a result, there are several new published protocols of IoT, which focus on protecting critical data. However, these protocols face challenges and in this paper, numerous solutions are provided to overcome these problems. The widely used protocols such as, 802.15.4, 6LoWPAN, and RPL are the resenting of the IoT layers PHY/MAC, Adoption and Network. While CoAP (Constrained Application Protocol) is the application layer protocol designed as replication of the HTTP to serve the small devices coming under class 1 and 2. Many implementations of CoAP has been accomplished which indicates it's crucial amd upcoming role in the future of IoT applications. This research article explored the security of CoAP over DTLS incurring many issues and proposed solutions as well as open challenges for future research.

ISBN

9781509013654

Publisher

Institute of Electrical and Electronics Engineers Inc.

First Page

172

Last Page

178

Disciplines

Computer Sciences

Keywords

6LoWPAN, 802.15.4, CoAP, Internet of Things (IoT), Protocols, RPL, Security

Scopus ID

84973547225

Indexed in Scopus

yes

Open Access

no

Share

COinS