4.6 Article

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

S. Gladson Oliver et al.

Summary: The Internet of Things allows devices with different characteristics and capabilities to be integrated with the internet, enabling interoperability for smart services. This robust and lightweight authentication scheme proposed in the article greatly reduces authentication overhead between devices, improving efficiency and reducing the risk of attacks.

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2022)

Article Chemistry, Analytical

Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library

Wen-Chung Tsai et al.

Summary: The ecosystem of the Internet of Things consists of endpoint clients, network devices, and cloud servers, with data transfers presenting security concerns. To address this, a key update mechanism called double OTP (D-OTP) is proposed to enhance security in IoT devices. Experimental results show that achieving unbreakable data transfers in 100 CoAP communication sessions require an additional latency overhead of 8.93%.

SENSORS (2022)

Article Chemistry, Analytical

Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks

Nasr Abosata et al.

Summary: This paper proposes a lightweight authentication scheme called PEOS for distributed sensors, which integrates important features of DTLS in the CoAP architecture and improves AES operations. The efficiency of PEOS authentication is evaluated using the Cooja simulator, showing reduced message size overhead and better throughput compared to other methods.

SENSORS (2022)

Article Computer Science, Information Systems

A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT

R. Hajian et al.

Summary: Internet of Things (IoT) is a developing technology that uses wireless and shared networks, but also faces security challenges. This paper examines authentication protocols in IoT environments and proposes a new D2D mutual AKA protocol that is anonymous, untraceable, and highly secure. Security analysis shows that the proposed protocol satisfies requirements and has better performance compared to existing protocols.

INTERNET OF THINGS (2022)

Article Computer Science, Information Systems

A framework for harmonizing internet of things (IoT) in cloud: analyses and implementation

Md Motaharul Islam et al.

Summary: The Internet of Things (IoT) generates a large amount of data that needs to be stored and computed in a cloud environment, requiring integration between the cloud and IoT. CoAP is a protocol for interaction between IoT devices, enabling connectivity to the internet and processing data in a scalable environment.

WIRELESS NETWORKS (2021)

Article Computer Science, Software Engineering

Modeling and simulation of the IEEE 802.11e wireless protocol with hidden nodes using Colored Petri Nets

Estefania Coronado et al.

Summary: This paper introduces a CPN model for analyzing QoS support in wireless local area networks, covering the behavior of the 802.11e protocol in the presence of hidden nodes. The model sets the basis for further exploring the performance of various mechanisms, and is used to provide a comprehensive study of the protocol's effectiveness.

SOFTWARE AND SYSTEMS MODELING (2021)

Article Telecommunications

ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

Suman Majumder et al.

Summary: CoAP is an application layer protocol used for communication between lightweight resource-constrained devices, associated with UDP and based on REST architecture, establishes secure sessions through DTLS protocol. ECC-CoAP utilizes elliptic curve cryptography for secure authentication between IoT devices and servers, providing high security strength and lightweight performance.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Theory & Methods

A hierarchical formal method for performance evaluation of WSNs protocol

Siham Zroug et al.

Summary: This paper proposes a formal approach to model and evaluate the CSMA/CA MAC protocol with a star topology in WSNs. The approach uses HTCPNs formalism for modeling and CPN-Tools for analysis, providing a method to handle time constraints inherent to the CSMA/CA protocol.

COMPUTING (2021)

Article Computer Science, Information Systems

Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network

Fuyuan Luo et al.

Summary: This paper evaluates and improves the security of the Wireless HART protocol using a model detection method combining eCK model theory and colored Petri net theory. The original protocol model was found to have vulnerabilities to man-in-the-middle attacks, which were then addressed through an improvement plan. After implementing the improvements, the security of the protocol was effectively enhanced.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Theory & Methods

A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS

Santiago Figueroa-Lorenzo et al.

ACM COMPUTING SURVEYS (2020)

Review Computer Science, Hardware & Architecture

Towards formal verification of IoT protocols: A Review

Katharina Hofer-Schmitz et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

6LowPSec: An end-to-end security protocol for 6LoWPAN

Ghada Glissaa et al.

AD HOC NETWORKS (2019)

Article Computer Science, Artificial Intelligence

Analysis of CoAP implementations for industrial Internet of Things: a survey

Markel Iglesias-Urkia et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

Ashok Kumar Das et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks

Ding Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Chemistry, Analytical

Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things

Floris Van den Abeele et al.

SENSORS (2017)

Article Computer Science, Information Systems

Performance evaluation of lightweight and secure protocol for wireless sensor networks: A protocol to enable Web services in IPv6 over low-power wireless personal area networks

Patricia E. Figueroa et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)

Article Computer Science, Hardware & Architecture

Formal modelling and analysis of DNP3 secure authentication

Raphael Amoah et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Interdisciplinary Applications

Lightweight security scheme for IoT applications using CoAP

Arijit Ukil et al.

INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS (2014)

Article Computer Science, Information Systems

On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method

Yongyuth Permpoontanalarp et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2012)