Skip to main content

LUP Student Papers

LUND UNIVERSITY LIBRARIES

Efficient Security Protocol for RESTful IoT devices

Kantharajan, Karnarjun LU and Shirafkan, Sahar LU (2020) EITM02 20201
Department of Electrical and Information Technology
Abstract
In this thesis, we presented comparisons with respect to Energy
Consumption, bandwidth, the Constraint application protocol (CoAP)
transaction time and throughput for four different security protocols.
We simulated and implemented the Datagram Transport Layer
Protection (DTLS) version 1.2, Transport Layer Protocol (TLS)
version 1.2 & 1.3, and Object Protection for Restricted RESTful
Environments (OSCORE). All of the above security protocols allow
client/server applications to communicate over the internet with
message forgery, eavesdropping, and tampering protection. In
particular, we compared the simulation and implementation results of
the mentioned protocols to extrapolate the performance of the DTLS
version 1.3.
Popular Abstract
The Internet of Things (IoT) has become a concept that defines the
billions of connected devices that are intelligent. IoT covers
everything from connected devices, mobile home products, roadside
cameras, production control equipment, medical equipment, vehicles,
and more. To drive innovation and improve customer satisfaction,
companies use IoT to transform their business and develop new
revenue streams. There are three crucial reasons for illustrating the
need for security in IoT devices, such as the sheer volume and
diversity of applications and data sensitivity. By the early future,
there will be an estimated 25 billion IoT devices worldwide, and
about 25% of cyber-attacks will target IoT devices. Although many
companies can... (More)
The Internet of Things (IoT) has become a concept that defines the
billions of connected devices that are intelligent. IoT covers
everything from connected devices, mobile home products, roadside
cameras, production control equipment, medical equipment, vehicles,
and more. To drive innovation and improve customer satisfaction,
companies use IoT to transform their business and develop new
revenue streams. There are three crucial reasons for illustrating the
need for security in IoT devices, such as the sheer volume and
diversity of applications and data sensitivity. By the early future,
there will be an estimated 25 billion IoT devices worldwide, and
about 25% of cyber-attacks will target IoT devices. Although many
companies can recognize that IoT security is necessary to protect
consumers and clients, the problem may rapidly become complicated.
As the market continues to evolve, there is a lack of best practices and
recommendations for securing the IoT device. Also, the other factor
to be addressed when designing an IoT system is the power
consumption of the system. With the rise of the Internet of Things,
the development of battery-operated devices is a significant aspect
that can make a huge difference in the device's efficiency. Device
power consumption in IoT is challenging since the device should still
be powered up and could be placed anywhere. Mostly, IoT devices
are remotely placed and need to use a battery to operate.

Considering the current challenges facing IoT security, in this thesis,
we picked four separate security protocols, including TLS 1.2, TLS
1.3, DTLS 1.2, and OSCORE for securing IoT devices. To compare
the security protocol's efficiency, we simulated and implemented the
the mentioned security protocol in a real environment. We compared the
security protocols with the data transmission time and throughput and
security overhead in the simulation by running the client and the
the server on PC. While in implementation using the Stand-alone multi-
radio modules (NINA-W102) as a client, we compared the security
protocols with the data transmission time and throughput, security
overhead, and even calculated the energy consumption of the IoT
unit, which is one of the issues in the IoT system's design. (Less)
Please use this url to cite or link to this publication:
author
Kantharajan, Karnarjun LU and Shirafkan, Sahar LU
supervisor
organization
course
EITM02 20201
year
type
H2 - Master's Degree (Two Years)
subject
keywords
Internet of Things (IoT), TLS 1.2 & 1.3, DTLS 1.2, OSCORE, CoAP, Security Protocols.
report number
LU/LTH-EIT 2020-793
language
English
id
9030534
date added to LUP
2020-11-04 09:56:05
date last changed
2020-11-04 09:56:05
@misc{9030534,
  abstract     = {{In this thesis, we presented comparisons with respect to Energy
Consumption, bandwidth, the Constraint application protocol (CoAP)
transaction time and throughput for four different security protocols.
We simulated and implemented the Datagram Transport Layer
Protection (DTLS) version 1.2, Transport Layer Protocol (TLS)
version 1.2 & 1.3, and Object Protection for Restricted RESTful
Environments (OSCORE). All of the above security protocols allow
client/server applications to communicate over the internet with
message forgery, eavesdropping, and tampering protection. In
particular, we compared the simulation and implementation results of
the mentioned protocols to extrapolate the performance of the DTLS
version 1.3.}},
  author       = {{Kantharajan, Karnarjun and Shirafkan, Sahar}},
  language     = {{eng}},
  note         = {{Student Paper}},
  title        = {{Efficient Security Protocol for RESTful IoT devices}},
  year         = {{2020}},
}