The Internet of Things (IoT), refers to all the infrastructures and technologies put in place to operate various objects through an Internet connection, it is about connected objects. One of the most frequently used IoT application protocols is the Constrained Application Protocol (CoAP) that matches restricted computers. CoAP is a solution for in-regulated data formats and a high security to protect government-related data from cyber-attacks. CoAP advises using DTLS (Datagram Transport Layer Security) to provide robust security of the UDP-based TLS edition. Initially, DTLS was planned for conventional networks. Therefore, a heavyweight solution is created by moving the protocols over the resource-limited computers. Unfortunately, DTLS has some security issues regarding the management of keys and its vulnerability against common cyber-attacks especially Denial of Service (DoS). Thus, a security approach is important to secure CoAP-based IoT infrastructures from these attacks. In our work, we propose to secure IoT data using enhanced DTLS protocol over CoAP. The enhancement DTLS make it possible to prevent DoS and Distributed DoS attacks. In our proposition, we apply a thrusted party (TP) to which we delegate the process of the authentication and authorization of clients. In addition, the TP is responsible of the verification of IP addresses in order to mitigate attackers from flooding the network with fake hello messages. The goal of our work was achieved since our enhanced protocol proves its security and efficiency in detecting malicious and harmful traffic. In addition, the protocol was able to identify DoS traffic behavior in order to mitigate this attack. To the best of our knowledge, the proposed protocol has only a percentage of 6.45% false negative rates and 0% of false positives rates when filtering the traffic
Skip Nav Destination
,
Article navigation
7 February 2024
16TH INTERNATIONAL ENGINEERING AND COMPUTING RESEARCH CONFERENCE (EURECA)
24 November 2021
Subang Jaya, Malaysia
Research Article|
February 07 2024
Data protection in IoT using CoAP based on enhanced DTLS Available to Purchase
A. Sara;
A. Sara
a)
1
Jouf University, College of Computer and Information Sciences
, Sakakah, Saudi Arabia
a)Corresponding author: [email protected]
Search for other works by this author on:
A. Sara
1,a)
J. Randa
1,b)
1
Jouf University, College of Computer and Information Sciences
, Sakakah, Saudi Arabia
a)Corresponding author: [email protected]
AIP Conf. Proc. 2729, 040003 (2024)
Citation
A. Sara, J. Randa; Data protection in IoT using CoAP based on enhanced DTLS. AIP Conf. Proc. 7 February 2024; 2729 (1): 040003. https://doi.org/10.1063/5.0194823
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
40
Views
Citing articles via
The implementation of reflective assessment using Gibbs’ reflective cycle in assessing students’ writing skill
Lala Nurlatifah, Pupung Purnawarman, et al.
Classification data mining with Laplacian Smoothing on Naïve Bayes method
Ananda P. Noto, Dewi R. S. Saputro
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Related Content
Detailed analysis and comparison of communication protocol-oriented IoT applications
AIP Conf. Proc. (July 2023)
Comparison of session layer communication protocols in IOT - A review
AIP Conf. Proc. (June 2023)
Design and implementation of secure MQTT protocol for embedded IoT device
AIP Conf. Proc. (December 2024)
Secure-key management protocols for wireless sensor networks in Internet of Things
AIP Conf. Proc. (June 2024)
Enhance security levels of internet of things through a blockchain: A review
AIP Conf. Proc. (March 2025)