Perez-Diaz, Jaime; Almenares-Mendoza, Florina Integrating an optimised PUF-based authentication scheme in OSCORE Proceedings Article In: Ad Hoc Networks Journal, 2022, ISSN: 1570-8705. Abstract | Links | BibTeX | Tags: coap, compromise, cynamon, IoT, mqtt, protocol security Seoane-Merida, Victor; García-Rubio, Carlos; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286. Abstract | Links | BibTeX | Tags: coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security2022
@inproceedings{almenarez007,
title = {Integrating an optimised PUF-based authentication scheme in OSCORE},
author = {Jaime Perez-Diaz and Florina Almenares-Mendoza },
doi = {https://doi.org/10.1016/j.adhoc.2022.103038},
issn = {1570-8705},
year = {2022},
date = {2022-11-23},
urldate = {2022-11-23},
volume = {140},
publisher = {Ad Hoc Networks Journal},
abstract = {Due to the growth in the amount and type of connected devices, mainly IoT devices, new scalable, lightweight and security-aware protocols, e.g., CoAP and MQTT, have been defined. For the definition of these protocols, the axioms concerning security must cover all the needs regarding authentication, confidentiality, integrity and availability of both devices and servers.
CoAP specifies mainly protocol security based on the transport layer through DTLS. Nevertheless, OSCORE (Object Security for Constrained RESTful Environments) has been recently defined to support end-to-end protection of RESTful interactions over the CoAP protocol. It was designed for constrained devices and networks supporting a range of proxy operations, including translation between different transport protocols. The main challenge presents in OSCORE is the establishment and exchange of pre-shared keys required to protect data. For that, this paper defines how use an optimised version of SRAM-based PUF (Physical Unclonable Functions) for a secure authentication, key establishment and exchanging model. The proposal has been implemented and evaluated in a scenario including IoT devices.},
keywords = {coap, compromise, cynamon, IoT, mqtt, protocol security},
pubstate = {published},
tppubtype = {inproceedings}
}
CoAP specifies mainly protocol security based on the transport layer through DTLS. Nevertheless, OSCORE (Object Security for Constrained RESTful Environments) has been recently defined to support end-to-end protection of RESTful interactions over the CoAP protocol. It was designed for constrained devices and networks supporting a range of proxy operations, including translation between different transport protocols. The main challenge presents in OSCORE is the establishment and exchange of pre-shared keys required to protect data. For that, this paper defines how use an optimised version of SRAM-based PUF (Physical Unclonable Functions) for a secure authentication, key establishment and exchanging model. The proposal has been implemented and evaluated in a scenario including IoT devices.2021
@article{campos004,
title = {Performance evaluation of CoAP and MQTT with security support for IoT environments},
author = {Victor Seoane-Merida and Carlos García-Rubio and Florina Almenares-Mendoza and Celeste Campo-Vázquez},
url = {http://hdl.handle.net/10016/33795},
doi = {https://doi.org/10.1016/j.comnet.2021.108338},
issn = {1389-1286},
year = {2021},
date = {2021-10-04},
urldate = {2021-10-04},
journal = {COMPUTER NETWORKS},
volume = {197},
issue = {108338},
pages = {1-22},
abstract = {World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to extend their capabilities, constituting what is known as Internet of Things (IoT). In these environments, the application layer is decisive for the quality of the connection, which has dependencies to the transport layer, mainly when secure communications are used. This paper analyses the performance offered by these two most popular protocols for the application layer: Constrained Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT). This analysis aims to examine the features and capabilities of the two protocols and to determine their feasibility to operate under constrained devices taking into account security support and diverse network conditions, unlike the previous works. Since IoT devices typically show battery constraints, the analysis is focused on bandwidth and CPU use, using realistic network scenarios, since this use translates to power consumption.},
keywords = {coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security},
pubstate = {published},
tppubtype = {article}
}
Publications
Integrating an optimised PUF-based authentication scheme in OSCORE Proceedings Article In: Ad Hoc Networks Journal, 2022, ISSN: 1570-8705. Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286.2022
2021