Amazing technological breakthrough possible @S-Logix

Office Address

  • 2nd Floor, #7a, High School Road, Secretariat Colony Ambattur, Chennai-600053 (Landmark: SRM School) Tamil Nadu, India
  • +91- 81240 01111

Social List

Security analysis of the constrained application protocol in the Internet of Things - 2013

Security Analysis Of The Constrained Application Protocol In The Internet Of Things

Research Area:  Internet of Things


The concept of Internet of Things involves huge number of constrained devices such as wireless sensors to communicate in a machine-to-machine pattern. Based on the implementation scenario, such communication might take place over a public network such as the Internet, which is based on the TCP/IP stack. However, different research working groups argue that some of these stack protocols such as the Hyper Text Transfer Protocol (HTTP) might not be suitable for constrained devices. Therefore, the IETF Constrained RESTful Environments (CoRE) WG has proposed the Constrained Application Protocol (CoAP); an application layer protocol for constrained devices in the IoTs. The CoRE WG proposed using IPSec or DTLS to secure the CoAP communication at different levels of the protocol stack. However, to investigate the feasibility of such a proposal, we use the X.805 security standard to analyze the security aspects of such implementation. The analysis highlights the main security drawbacks and hence argues of the need for a new integrated security solution.


Author(s) Name:  Thamer A. Alghamdi; Aboubaker Lasebae; Mahdi Aiash

Journal name:  

Conferrence name:  International Conference on Future Generation Communication Technologies (FGCT 2013)

Publisher name:  IEEE

DOI:  10.1109/FGCT.2013.6767217

Volume Information: