Efficient Security Protocol for RESTful IoT devices
(2020) EITM02 20201Department of Electrical and Information Technology
- Abstract
- In this thesis, we presented comparisons with respect to Energy
Consumption, bandwidth, the Constraint application protocol (CoAP)
transaction time and throughput for four different security protocols.
We simulated and implemented the Datagram Transport Layer
Protection (DTLS) version 1.2, Transport Layer Protocol (TLS)
version 1.2 & 1.3, and Object Protection for Restricted RESTful
Environments (OSCORE). All of the above security protocols allow
client/server applications to communicate over the internet with
message forgery, eavesdropping, and tampering protection. In
particular, we compared the simulation and implementation results of
the mentioned protocols to extrapolate the performance of the DTLS
version 1.3. - Popular Abstract
- The Internet of Things (IoT) has become a concept that defines the
billions of connected devices that are intelligent. IoT covers
everything from connected devices, mobile home products, roadside
cameras, production control equipment, medical equipment, vehicles,
and more. To drive innovation and improve customer satisfaction,
companies use IoT to transform their business and develop new
revenue streams. There are three crucial reasons for illustrating the
need for security in IoT devices, such as the sheer volume and
diversity of applications and data sensitivity. By the early future,
there will be an estimated 25 billion IoT devices worldwide, and
about 25% of cyber-attacks will target IoT devices. Although many
companies can... (More) - The Internet of Things (IoT) has become a concept that defines the
billions of connected devices that are intelligent. IoT covers
everything from connected devices, mobile home products, roadside
cameras, production control equipment, medical equipment, vehicles,
and more. To drive innovation and improve customer satisfaction,
companies use IoT to transform their business and develop new
revenue streams. There are three crucial reasons for illustrating the
need for security in IoT devices, such as the sheer volume and
diversity of applications and data sensitivity. By the early future,
there will be an estimated 25 billion IoT devices worldwide, and
about 25% of cyber-attacks will target IoT devices. Although many
companies can recognize that IoT security is necessary to protect
consumers and clients, the problem may rapidly become complicated.
As the market continues to evolve, there is a lack of best practices and
recommendations for securing the IoT device. Also, the other factor
to be addressed when designing an IoT system is the power
consumption of the system. With the rise of the Internet of Things,
the development of battery-operated devices is a significant aspect
that can make a huge difference in the device's efficiency. Device
power consumption in IoT is challenging since the device should still
be powered up and could be placed anywhere. Mostly, IoT devices
are remotely placed and need to use a battery to operate.
Considering the current challenges facing IoT security, in this thesis,
we picked four separate security protocols, including TLS 1.2, TLS
1.3, DTLS 1.2, and OSCORE for securing IoT devices. To compare
the security protocol's efficiency, we simulated and implemented the
the mentioned security protocol in a real environment. We compared the
security protocols with the data transmission time and throughput and
security overhead in the simulation by running the client and the
the server on PC. While in implementation using the Stand-alone multi-
radio modules (NINA-W102) as a client, we compared the security
protocols with the data transmission time and throughput, security
overhead, and even calculated the energy consumption of the IoT
unit, which is one of the issues in the IoT system's design. (Less)
Please use this url to cite or link to this publication:
http://lup.lub.lu.se/student-papers/record/9030534
- author
- Kantharajan, Karnarjun LU and Shirafkan, Sahar LU
- supervisor
- organization
- course
- EITM02 20201
- year
- 2020
- type
- H2 - Master's Degree (Two Years)
- subject
- keywords
- Internet of Things (IoT), TLS 1.2 & 1.3, DTLS 1.2, OSCORE, CoAP, Security Protocols.
- report number
- LU/LTH-EIT 2020-793
- language
- English
- id
- 9030534
- date added to LUP
- 2020-11-04 09:56:05
- date last changed
- 2020-11-04 09:56:05
@misc{9030534, abstract = {{In this thesis, we presented comparisons with respect to Energy Consumption, bandwidth, the Constraint application protocol (CoAP) transaction time and throughput for four different security protocols. We simulated and implemented the Datagram Transport Layer Protection (DTLS) version 1.2, Transport Layer Protocol (TLS) version 1.2 & 1.3, and Object Protection for Restricted RESTful Environments (OSCORE). All of the above security protocols allow client/server applications to communicate over the internet with message forgery, eavesdropping, and tampering protection. In particular, we compared the simulation and implementation results of the mentioned protocols to extrapolate the performance of the DTLS version 1.3.}}, author = {{Kantharajan, Karnarjun and Shirafkan, Sahar}}, language = {{eng}}, note = {{Student Paper}}, title = {{Efficient Security Protocol for RESTful IoT devices}}, year = {{2020}}, }