Loading [MathJax]/extensions/MathMenu.js
End-to-end security for sleepy smart object networks | IEEE Conference Publication | IEEE Xplore

End-to-end security for sleepy smart object networks


Abstract:

We develop a new secure and energy-efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart...Show More

Abstract:

We develop a new secure and energy-efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart object networks. This architecture and the communication model ensures data integrity and authenticity over a multi-hop network topology. It provides a mirroring mechanism that uses a proxy to serve data on behalf of sleeping smart objects, thereby allowing them to act as always-online web servers. A working prototype implementation of the architecture is also developed. The security features in the architecture presented in this paper are based on using strong public-key cryptography. Contrary to popular belief, our performance evaluation shows that asymmetric public-key cryptography can be implemented on small 8-bit microcontrollers without modifying the underlying cryptographic algorithms using public libraries.
Date of Conference: 22-25 October 2012
Date Added to IEEE Xplore: 31 January 2013
ISBN Information:
Conference Location: Clearwater, FL, USA

References

References is not available for this document.