Home / Papers / Internet of Things ( IoT ) : Security Analysis &...

Internet of Things ( IoT ) : Security Analysis & Security Protocol

1 Citations2017
CoAP Vishwesh, Rajashekar
journal unavailable

This research article explored the security of CoAP over DTLS incurring many issues and proposed solutions as well as open challenges for future research.

Abstract

The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. With the rapid growth of IoT, there is also a steady increase in security vulnerabilities of the linked objects. For example, a car manufacturer may want to link the systems within a car to smart home network networks to increase sales, but if all the various people involved do not embrace security the system will be exposed to security risks. As a result, there are several new published protocols of IoT, which focus on protecting critical data. CoAP (Constrained Application Protocol) is the application layer protocol designed as replication of the HTTP to serve the small devices coming under class 1 and 2. Many implementations of CoAP has been accomplished which indicates it’s crucial and upcoming role in the future of IoT applications. This research article explored the security of CoAP over DTLS incurring many issues and proposed solutions as well as open challenges for future research. Keywords—Internet of things; IoT; Security, CoAP