skip to main content
10.1145/2523501.2523504acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Lightweight security scheme for vehicle tracking system using CoAP

Authors Info & Claims
Published:08 September 2013Publication History

ABSTRACT

In this paper we present a lightweight security scheme for authentication and key management to establish a secure channel for Intelligent Transportation System (ITS) for an IoT (Internet of Things) application. We choose Constrained Application Protocol (CoAP) as lightweight application layer protocol. Low overhead security is still an open challenge for CoAP. We propose a payload embedded low cost symmetric-key based robust authentication and key management mechanism on CoAP. This minimizes the security overhead by eliminating expensive handshaking and ciphersuite agreement of standard TLS and DTLS. We propose some unique modification in the CoAP header to invoke its secure mode in an optimized manner. Further, we propose a secure channel with adaptive reliability which reduces the overall communication cost. Such a low overhead security scheme for CoAP is hitherto unexplored. The efficacy of our proposed scheme is demonstrated through laboratory experiments in an emulated environment.

References

  1. Colitti, W. Steenhaut, K. and Caro, N. D. Integrating Wireless Sensor Networks with Web Applications. In Proc. IPSN (2011).Google ScholarGoogle Scholar
  2. Ukil, A. Context protecting privacy preservation in ubiquitous computing. In Proc. Computer Information Systems and Industrial Management Applications (CISIM 2010), IEEE (2010), 273--278.Google ScholarGoogle ScholarCross RefCross Ref
  3. Li, Y. Li, J. Ren, J. and Wu, J. Providing hop-by-hop authentication and source privacy in wireless sensor networks. In Proc. INFOCOM 2012, IEEE (2012), 3071--3075.Google ScholarGoogle Scholar
  4. Mare, S. Sorber, J. Shin, M. Cornelius, C. Kotz, D. Adaptlite: privacy-aware, secure, and efficient mhealth sensing. In Proc. WPES 2011, ACM Press (2011), 137--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Shelby, Z. Hartke, K. and Bormann, C. Constrained Application Protocol (CoAP), draft-ietf-core-coap-18, 28 June, 2013.Google ScholarGoogle Scholar
  6. Bandyopadhyay, S. and Bhattacharyya, A. Lightweight Internet protocols for web enablement of sensors using constrained gateway devices. In Proc. International Conference on Computing, Networking and Communications (ICNC), 2013, San Diego, CA, IEEE (2013), 334--340. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bandyopadhyay, S. and Bhattacharyya, A. Energy Efficient Sensor Data Distribution Using Mobile Phone in Cyber-Physical-System. In Proc. 14th International Conference on Distributed Computing and Networking (ICDCN), 2013, Mumbai, India.Google ScholarGoogle Scholar
  8. Moskowitz, R. HIP Diet EXchange (DEX), IETF draft-moskowitz-hip-rg-dex-01, July 7, 2010.Google ScholarGoogle Scholar
  9. Eronen, P. and Tschofenig, H. (Editors) Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) (RFC 4279).Google ScholarGoogle Scholar
  10. Modadugu, N. and Rescorla, E. The Design and Implementation of Datagram TLS. In Proc. NDSS (2004).Google ScholarGoogle Scholar
  11. Hartke, K. and Bergmann, O. Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls-01 (2012). http://www.ietf.org/proceedings/83/slides/slides-83-lwig-2.pdfGoogle ScholarGoogle Scholar
  12. Zenner, E. Nonce Generators and the Nonce Reset Problem. In Proc. 12th International Security Conference (ISC 2009), 411--426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Needham, R. M.; Schroeder, M. D. Authentication revisited. In ACM SIGOPS Operating Systems Review 21 (1), Jan 1987. doi:10.1145/24592.24593. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lindell, Y. Foundations of Cryptography. Dept. of Computer Science Bar-Ilan University, Israel (2010).Google ScholarGoogle Scholar
  15. Boneh, D. Stanford University, 2012, http://crypto.stanford.edu/~dabo/cs255/lectures/PRP-PRF.pdf.Google ScholarGoogle Scholar
  16. http://www.digi.com/products/wireless-routers-gateways/routinggateways/connectportx5#overview.Google ScholarGoogle Scholar
  17. Kalitay, H. K. and Nambiarz, M. K. Designing WANem: A Wide Area Network Emulator tool. In proc. 3rd International Conference on Communication Systems and Networks (COMSNETS), 2011.Google ScholarGoogle ScholarCross RefCross Ref
  18. Ukil, A. Security and Privacy in Wireless Sensor Networks. In Book Smart Wireless Sensor Networks, Intechweb Press (2010), 395--418.Google ScholarGoogle Scholar
  19. Bandyopadhyay, S. Bhattacharyya, A. and Pal, A. 2013. Poster Abstract: Adapting Sensed Indication for Vehicular Analytics. In proc. SenSys, Nov 11--15 2013, Roma, Italy (to appear)Google ScholarGoogle Scholar
  20. Ukil, A. Sen, J. and Koilakonda, S. 2011. Embedded Security for Internet of Things. In Proc. 2nd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS), 2011, India.Google ScholarGoogle Scholar

Index Terms

  1. Lightweight security scheme for vehicle tracking system using CoAP

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASPI '13: Proceedings of the International Workshop on Adaptive Security
          September 2013
          54 pages
          ISBN:9781450325431
          DOI:10.1145/2523501

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 September 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader