Abstract | ||
---|---|---|
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for efficiency and scalability reasons. These intermediate proxies break end-to-end security when using even the state-of-the-art transport layer security (TLS) solutions. In this direction, the recent object security for constrained RESTful environments (OSCORE) has been standardized to enable end-to-end security even in the presence of malicious proxies. In this article, we focus on the key establishment process based on application-layer techniques. In particular, we evaluate the ephemeral Diffie–Hellman over COSE (EDHOC), the
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">de facto</italic>
key establishment protocol for OSCORE. Based on EDHOC, we propose CompactEDHOC, as a lightweight alternative, in which negotiation of security parameters is extracted from the core protocol. In addition to providing end-to-end security properties, we perform extensive evaluation using real IoT hardware and simulation tools. Our evaluation results prove EDHOC-based proposals as an effective and efficient approach for the establishment of a security association in IoT-constrained scenarios. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1109/JIOT.2019.2959428 | IEEE Internet of Things Journal |
Keywords | DocType | Volume |
Datagram transport layer security (DTLS),ephemeral Diffie–Hellman over COSE (EDHOC),Internet of Things (IoT),key establishment | Journal | 7 |
Issue | ISSN | Citations |
3 | 2327-4662 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Salvador Pérez | 1 | 0 | 1.01 |
José L. Hernández-Ramos | 2 | 11 | 2.54 |
Shahid Raza | 3 | 493 | 36.66 |
Antonio G. Skarmeta | 4 | 15 | 2.81 |