Browse > Article

ECQV Certificate Based Security Mechanism for End-to-End Security in IoT  

Yeon, Han-Beol (단국대학교/컴퓨터학과)
Park, Chang seop (단국대학교/컴퓨터학과)
Publication Information
Abstract
IoT technology is evolving and related services and technologies are spreading throughout the life. These IoT technologies make life easier for users, but they also have big threats like double-edged swords. Therefore, the importance of security is emerging and related researches are actively proceeding. Existing researches have focused on reducing the computational load on the constrained devices, performing the DTLS for the end-to-end security from a network architecture perspective. In this paper, we propose a DTLS protocol that uses ECQV certificate instead of existing X.509 certificate to reduce the load of DTLS protocol from the network perspective. In addition, the proposed scheme is implemented and compared with PSK and RPK modes.
Keywords
DTLS;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Shelby, Zach, Klaus Hartke, and Carsten Bormann, "The constrained application protocol (CoAP)," No. RFC 7252, 2014.
2 Granjal, Jorge, Edmundo Monteiro, and Jorge Sa Silva, "Security in the integration of low-power wireless sensor networks with the internet: A survey," Ad Hoc Networks 24, pp. 264-297, 2015.   DOI
3 Roman, Rodrigo, Pablo Najera, and Javier Lopez, "Securing the internet of things," Computer 44.9, pp. 51-59, 2011.   DOI
4 IEEE Computer Society. IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), 2006.
5 Kushalnagar, Nandakishore, Gabriel Montenegro, and Christian Schumacher, "IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals," No. RFC 4919, 2007.
6 Winter, Tim, "RPL: IPv6 routing protocol for low-power and lossy networks," 2012.
7 Hummen, R., Shafagh, H., Raza, S., Voig, T., & Wehrle, K, "Delegation-based Authentication and Authorization for the IP-based Internet of Things," 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE, pp. 284-292, 2014.
8 dos Santos, G. L., da Cunha Rodrigues, G., Granville, L. Z., & Tarouco, L. M. R, "A DTLS-based security architecture for the Internet of Things," 2015 IEEE Symposium on Computers and Communication (ISCC), IEEE, pp. 809-815, 2015.
9 권혁진, and 강남희, "사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석," 한국통신학회논문지 40.8, pp. 1588-1596, 2015.   DOI