Skip to content

Measurement applications for our contribution: Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions

Notifications You must be signed in to change notification settings

inetrg/tnsm-icn-coap-objectsecurity-2021

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions

Paper

This repository contains code and documentation to reproduce experimental results of the paper Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions published in the IEEE Transactions on Network and Service Management (TNSM).

  • Cenk Gündogan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch, Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions, In: IEEE Transactions on Network and Service Management (TNSM), Vol. 19, No. 1, pp. 538--553, March 2022.

    Abstract

    Content objects are confined data elements that carry meaningful information. Massive amounts of content objects are published and exchanged every day on the Internet. The emerging Internet of Things (IoT) augments the network edge with reading sensors and controlling actuators that comprise machine-to-machine communication using small data objects. IoT content objects are often messages that fit into single IPv6 datagram. These IoT messages frequently traverse protocol translators at gateways, which break end-to-end transport and security of Internet protocols. To preserve content security from end to end via gateways and proxies, the IETF recently developed Object Security for Constrained RESTful Environments (OSCORE), which extends the Constrained Application Protocol (CoAP) with content object security features commonly known from Information Centric Networking (ICN).

    This paper revisits the current IoT protocol architectures and presents a comparative analysis of protocol stacks that protect request-response transactions. We discuss features and limitations of the different protocols and analyze emerging functional extensions. We measure the protocol performances of CoAP over Datagram Transport Layer Security (DTLS), OSCORE, and the information-centric Named Data Networking (NDN) protocol on a large-scale IoT testbed in single- and multi-hop scenarios. Our findings indicate that (a) OSCORE improves on CoAP over DTLS in error-prone wireless regimes due to omitting the overhead of maintaining security sessions at endpoints, (b) NDN attains superior robustness and reliability due to its intrinsic network caches and hop-wise retransmissions, and (c) OSCORE/CoAP offers room for improvement and optimization in multiple directions.

Please follow our Getting Started instructions for further information on how to compile and execute the code.

About

Measurement applications for our contribution: Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions

Topics

Resources

Stars

Watchers

Forks