Abstract
The Internet of things (IoT) is seen as one of the next Internet revolutions. More and more IoT devices are connecting to the Internet. These devices sense the physical world and perform some tasks in response to events occurring. Such devices are identified through unique IP addresses and often have to send data which might be sensitive and confidential over the network. Thus, the security of the data packets sent by IoT devices over the Internet has to be considered. The Constrained Application Protocol (CoAP) supports the RESTful HTTP functionalities and has been proposed specifically for IoT devices which are characterized by low processing power and energy. However, CoAP uses UDP protocol and must rely on the Datagram Transport Layer Security (DTLS) and sometimes on IPSec for security. In this paper, the focus has been on the practical evaluation of the different mechanisms that can be used to secure data packets being sent by IoT devices, to ensure that communication from the IoT node to the cloud/server is not compromised; and data is encrypted ensuring full end-to-end security. The IoT technologies communication protocols considered are transport layer and application layer protocols HTTP, CoAP, and FTP. A testbed was implemented which allow connectivity between a resource-constrained device, namely a Raspberry Pi, and a cloud server. Using this test bed, the different communication protocols for IoT secure connectivity have been assessed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kumar, M.: DDoS Attack takes down central heating system amidst Winter in Finland (2016). [Online] Available at: https://thehackernews.com/2016/11/heating-system-hacked.html
Israel, T.: Israel’s electric authority hit by ‘severe’ cyber-attack (2016). [Online] Available at: https://www.timesofisrael.com/steinitz-israels-electric-authority-hit-by-severe-cyber-attack/
Ankara and Kocaeli: Major cyber-attack on Turkish Energy Ministry claimed (2016). [Online] Available at: https://www.hurriyetdailynews.com/major-cyber-attack-on-turkish-energy-ministry-claimed.aspx?PageID=238&NID=107981&NewsCatID=348
Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills,G.B.: Integration of cloud computing with internet of things: challenges and open issues. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, 2017, pp. 670–675
Shelby, Z., Sensinode, Hartke,K.: Constrained Application Protocol (CoAP),draft-ietf-core-coap-18, 28 June 2013. https://tools.ietf.org/html/draft-ietf-core-coap-18
Albalas, F., Alsoud, M., Almomani, A., Almomani, O.: Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Int. Arab J. Inform. Technol. 15 (2018)
Canuto, L., Santos, L., Vieira, L., Gonçalves, R., Rabadâo,C.:CoAP Flow signatures for the internet of things. In: 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, pp. 1–6 (2019)
Martí, M., Garcia-Rubio, C., Campo, C.: Performance Evaluation of CoAP and MQTT_SN in an IoT Environment. In: Proceedings 13th International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2019), vol 31, p. 49
Caturano, F., Jiménez, J., Romano, S.P.: Automated discovery of CoAP-enabled IoT devices. In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, pp. 396–401 (2019). https://doi.org/10.1109/ICUFN.2019.8806084
aiocoap: The Python CoAP library, available at https://aiocoap.readthedocs.io/en/latest/, https://git.azurewebsites.net/chrysn/aiocoap
Singh, D., Pati, B., Panigrahi, C.R., Swagatika, S.: Security issues in IoT and their countermeasures in smart city applications. In: Advanced Computing and Intelligent Engineering, vol. 1089, pp. 301–313. Springer, Berlin (2020)
Rath, M., Pati, B.: Security assertion of IoT Devices using cloud of things perception. Int. J. Interdiscip. Telecommun. Network. 11(4), 17–31 (2019)
Mishra, M., Choudhury, P., Pati, B.: Modified ride-NN optimizer for the IoT based plant disease detection. J. Ambient Intell. Human Comput. (2020). https://doi.org/10.1007/s12652-020-02051-6
Kovacs, E.: 70 Percent of IoT Devices Vulnerable to Cyberattacks: HP, July 29 (2014). available at https://www.securityweek.com/70-iot-devices-vulnerable-cyberattacks-hp
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Boolakee, R.V.S., Armoogum, S., Foogooa, R., Suddul, G. (2021). Ensuring Secure Communication from an IoT Edge Device to a Server Through IoT Communication Protocols. In: Panigrahi, C.R., Pati, B., Pattanayak, B.K., Amic, S., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 1299. Springer, Singapore. https://doi.org/10.1007/978-981-33-4299-6_28
Download citation
DOI: https://doi.org/10.1007/978-981-33-4299-6_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4298-9
Online ISBN: 978-981-33-4299-6
eBook Packages: EngineeringEngineering (R0)