The Internet of Things (IoT), refers to all the infrastructures and technologies put in place to operate various objects through an Internet connection, it is about connected objects. One of the most frequently used IoT application protocols is the Constrained Application Protocol (CoAP) that matches restricted computers. CoAP is a solution for in-regulated data formats and a high security to protect government-related data from cyber-attacks. CoAP advises using DTLS (Datagram Transport Layer Security) to provide robust security of the UDP-based TLS edition. Initially, DTLS was planned for conventional networks. Therefore, a heavyweight solution is created by moving the protocols over the resource-limited computers. Unfortunately, DTLS has some security issues regarding the management of keys and its vulnerability against common cyber-attacks especially Denial of Service (DoS). Thus, a security approach is important to secure CoAP-based IoT infrastructures from these attacks. In our work, we propose to secure IoT data using enhanced DTLS protocol over CoAP. The enhancement DTLS make it possible to prevent DoS and Distributed DoS attacks. In our proposition, we apply a thrusted party (TP) to which we delegate the process of the authentication and authorization of clients. In addition, the TP is responsible of the verification of IP addresses in order to mitigate attackers from flooding the network with fake hello messages. The goal of our work was achieved since our enhanced protocol proves its security and efficiency in detecting malicious and harmful traffic. In addition, the protocol was able to identify DoS traffic behavior in order to mitigate this attack. To the best of our knowledge, the proposed protocol has only a percentage of 6.45% false negative rates and 0% of false positives rates when filtering the traffic

1.
K.
Khalil
,
K.
Elgazzar
,
A.
Abdelgawad
, and
M.
Bayoumi
,
A security approach for CoAP-based internet of things resource discovery
, in
2020 IEEE 6th World Forum on Internet of Things (WF-IoT
),
2020
, pp.
1
6
.
2.
F. A.
Alhaidari
and
E. J.
Alqahtani
,
Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey
,
J. Commun.
, vol.
15
, no.
1
,
2020
.
3.
N. F.
Syed
,
Z.
Baig
,
A.
Ibrahim
, and
C.
Valli
,
Denial of service attack detection through machine learning for the IoT
,
J. Inf. Telecommun.
, pp.
1
22
,
2020
.
4.
Haroon
,
A.
,
Akram
,
S.
,
Shah
,
M. A.
, &
Wahid
,
A.
(
2017
, September).
E-Lithe: A lightweight secure DTLS for IoT
.
In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall
) (pp.
1
5
).
IEEE…
5.
Kajwadkar
,
S.
, &
Jain
,
V. K.
(
2018
, October).
A novel algorithm for DoS and DDoS attack detection in internet of things
.
In 2018 Conference on Information and Communication Technology (CICT
) (pp.
1
4
).
IEEE
.
6.
A.
Chavan
and
M. K.
Nighot
,
Secure CoAP using enhanced DTLS for Internet of things
,
Int. J. Innov. Res. Comput. Commun. Eng.
, vol.
2
, no.
12
, pp.
7601
7608
,
2014
.
7.
Maleh
,
Y.
,
Ezzati
,
A.
, &
Belaissaoui
,
M.
(
2016
, October).
An enhanced DTLS protocol for Internet of Things applications
.
In 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM
) (pp.
168
173
).
IEEE
.
8.
Majumder
,
S.
,
Ray
,
S.
,
Sadhukhan
,
D.
,
Khan
,
M. K.
, &
Dasgupta
,
M.
(
2021
).
ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things
.
Wireless Personal Communications
,
116
(
3
),
1867
1896
9.
Armando
,
A.
,
Basin
,
D.
,
Boichut
,
Y.
,
Chevalier
,
Y.
,
Compagna
,
L.
,
Cuéllar
,
J.
, … &
Vigneron
,
L.
(
2005
, July).
The AVISPA tool for the automated validation of internet security protocols and applications
.
In International conference on computer aided verification
(pp.
281
285
).
Springer
,
Berlin, Heidelberg
.
10.
P. M.
Kumar
and
U. D.
Gandhi
,
Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application
,
J. Supercomput.
, pp.
1
21
,
2020
.
11.
Park
,
J.
, &
Kang
,
N.
(
2014
, October).
Lightweight secure communication for CoAP-enabled internet of things using delegated DTLS handshake
.
In 2014 International Conference on Information and Communication Technology Convergence (ICTC
) (pp.
28
33
).
IEEE
.
12.
A.
Chavan
and
M. K.
Nighot
,
Secure CoAP using enhanced DTLS for Internet of things
,
Int. J. Innov. Res. Comput. Commun. Eng.
, vol.
2
, no.
12
, pp.
7601
7608
,
2014
.
13.
Capossele
,
V. Cervo
,
G.
De Cicco
, and
C.
Petrioli
,
Security as a CoAP resource: an optimized DTLS implementation for the IoT
, in
2015 IEEE international conference on communications (ICC
),
2015
, pp.
549
554
.
14.
Y.
Maleh
,
A.
Ezzati
and
M.
Belaissaoui
,
An enhanced DTLS protocol for Internet of Things applications
,
2016 International Conference on Wireless Networks and Mobile Communications (WINCOM
),
2016
, pp.
168
173
, doi: .
15.
Ukil
,
A.
,
Bandyopadhyay
,
S.
,
Bhattacharyya
,
A.
,
Pal
,
A.
, &
Bose
,
T.
(
2014
).
Lightweight security scheme for IoT applications using CoAP
.
International Journal of Pervasive Computing and Communications.
16.
KARRIS
,
Steven T.
Introduction to Simulink with engineering applications.
Orchard Publications
,
2006
.
This content is only available via PDF.
You do not currently have access to this content.