< Terug naar vorige pagina

Publicatie

Toward the inclusion of end-to-end security in the OM2M platform

Tijdschriftbijdrage - Tijdschriftartikel

The exponential growth in the number of Internet of things (IoT) devices and their potential in many applications in a vast number of domains fuelled the development of different IoT platforms, supported by big companies and industry groups. These platforms are able to provide reliable services to IoT devices and reduce the time to market for the targeted applications. Unfortunately, these proprietary solutions fragment the IoT market and hamper horizontal integration. The need to interoperate the different IoT platforms and communication protocols pushed the Standards Developing Organizations (SDOs) to the specification of a machine-to-machine (M2M) service layer, published as the oneM2M (OM2M) standard. Although the OM2M standard provides generic guidelines to implement security solutions which include authentication, authorization, confidentiality and data integrity, more efficient security schemes should be investigated when constrained IoT devices are concerned. This paper presents two main contributions. First, a CoAPS binding for the OM2M platform is provided that enables secure and reliable communication with constrained IoT devices. Second, a lightweight dynamic access control system is designed, developed and integrated in a OM2M-based architecture. It allows to dynamically grant or revoke access permission in an anonymous way to constrained IoT devices for controlling some actuators. From the experimental results, we can conclude that the computational complexity of the proposed security scheme is extremely low for the client device which requests data access. We show that a constrained IoT device establishes a trust relationship with the OM2M server in few seconds.

Tijdschrift: Journal of Supercomputing
ISSN: 0920-8542
Issue: 4
Volume: 77
Pagina's: 4056–4080
Jaar van publicatie:2021
Trefwoorden:CoAPS, ECQV, Tinydtls, MicroECC, Scandium, OneM2M, interoperability, Authentication, Authorization
  • ORCID: /0000-0002-5901-4218/work/90795578
  • ORCID: /0000-0002-3622-1943/work/90795439
  • ORCID: /0000-0002-9965-915X/work/90795058
  • WoS Id: 000569279700001
  • Scopus Id: 85091027890
  • DOI: https://doi.org/10.1007/s11227-020-03415-7
BOF-keylabel:ja
IOF-keylabel:ja
BOF-publication weight:1
Auteurs:Regional
Authors from:Government, Higher Education
Toegankelijkheid:Closed