Skip to main content

Ensuring Secure Communication from an IoT Edge Device to a Server Through IoT Communication Protocols

  • Conference paper
  • First Online:
  • 698 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1299))

Abstract

The Internet of things (IoT) is seen as one of the next Internet revolutions. More and more IoT devices are connecting to the Internet. These devices sense the physical world and perform some tasks in response to events occurring. Such devices are identified through unique IP addresses and often have to send data which might be sensitive and confidential over the network. Thus, the security of the data packets sent by IoT devices over the Internet has to be considered. The Constrained Application Protocol (CoAP) supports the RESTful HTTP functionalities and has been proposed specifically for IoT devices which are characterized by low processing power and energy. However, CoAP uses UDP protocol and must rely on the Datagram Transport Layer Security (DTLS) and sometimes on IPSec for security. In this paper, the focus has been on the practical evaluation of the different mechanisms that can be used to secure data packets being sent by IoT devices, to ensure that communication from the IoT node to the cloud/server is not compromised; and data is encrypted ensuring full end-to-end security. The IoT technologies communication protocols considered are transport layer and application layer protocols HTTP, CoAP, and FTP. A testbed was implemented which allow connectivity between a resource-constrained device, namely a Raspberry Pi, and a cloud server. Using this test bed, the different communication protocols for IoT secure connectivity have been assessed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kumar, M.: DDoS Attack takes down central heating system amidst Winter in Finland (2016). [Online] Available at: https://thehackernews.com/2016/11/heating-system-hacked.html

  2. Israel, T.: Israel’s electric authority hit by ‘severe’ cyber-attack (2016). [Online] Available at: https://www.timesofisrael.com/steinitz-israels-electric-authority-hit-by-severe-cyber-attack/

  3. Ankara and Kocaeli: Major cyber-attack on Turkish Energy Ministry claimed (2016). [Online] Available at: https://www.hurriyetdailynews.com/major-cyber-attack-on-turkish-energy-ministry-claimed.aspx?PageID=238&NID=107981&NewsCatID=348

  4. Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills,G.B.: Integration of cloud computing with internet of things: challenges and open issues. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, 2017, pp. 670–675

    Google Scholar 

  5. Shelby, Z., Sensinode, Hartke,K.: Constrained Application Protocol (CoAP),draft-ietf-core-coap-18, 28 June 2013. https://tools.ietf.org/html/draft-ietf-core-coap-18

  6. Albalas, F., Alsoud, M., Almomani, A., Almomani, O.: Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Int. Arab J. Inform. Technol. 15 (2018)

    Google Scholar 

  7. Canuto, L., Santos, L., Vieira, L., Gonçalves, R., Rabadâo,C.:CoAP Flow signatures for the internet of things. In: 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, pp. 1–6 (2019)

    Google Scholar 

  8. Martí, M., Garcia-Rubio, C., Campo, C.: Performance Evaluation of CoAP and MQTT_SN in an IoT Environment. In: Proceedings 13th International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2019), vol 31, p. 49‬

    Google Scholar 

  9. Caturano, F., Jiménez, J., Romano, S.P.: Automated discovery of CoAP-enabled IoT devices. In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, pp. 396–401 (2019). https://doi.org/10.1109/ICUFN.2019.8806084

  10. aiocoap: The Python CoAP library, available at https://aiocoap.readthedocs.io/en/latest/, https://git.azurewebsites.net/chrysn/aiocoap

  11. Singh, D., Pati, B., Panigrahi, C.R., Swagatika, S.: Security issues in IoT and their countermeasures in smart city applications. In: Advanced Computing and Intelligent Engineering, vol. 1089, pp. 301–313. Springer, Berlin (2020)

    Google Scholar 

  12. Rath, M., Pati, B.: Security assertion of IoT Devices using cloud of things perception. Int. J. Interdiscip. Telecommun. Network. 11(4), 17–31 (2019)

    Google Scholar 

  13. Mishra, M., Choudhury, P., Pati, B.: Modified ride-NN optimizer for the IoT based plant disease detection. J. Ambient Intell. Human Comput. (2020). https://doi.org/10.1007/s12652-020-02051-6

    Article  Google Scholar 

  14. Kovacs, E.: 70 Percent of IoT Devices Vulnerable to Cyberattacks: HP, July 29 (2014). available at https://www.securityweek.com/70-iot-devices-vulnerable-cyberattacks-hp

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Roshni Vidya S. Boolakee , Sandhya Armoogum , Ravi Foogooa or Geerish Suddul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Boolakee, R.V.S., Armoogum, S., Foogooa, R., Suddul, G. (2021). Ensuring Secure Communication from an IoT Edge Device to a Server Through IoT Communication Protocols. In: Panigrahi, C.R., Pati, B., Pattanayak, B.K., Amic, S., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 1299. Springer, Singapore. https://doi.org/10.1007/978-981-33-4299-6_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-4299-6_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-4298-9

  • Online ISBN: 978-981-33-4299-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics