Secure and Authorized Client-to-Client Communication for LwM2M

03/07/2022
by   Leandro Lanzieri, et al.
0

Constrained devices on the Internet of Things (IoT) continuously produce and consume data. LwM2M manages millions of these devices in a server-centric architecture, which challenges edge networks with expensive uplinks and time-sensitive use cases. In this paper, we contribute two LwM2M extensions to enable client-to-client (C2C) communication: (i) an authorization mechanism for clients, and (ii) an extended management interface to allow secure C2C access to resources. We analyse the security properties of the proposed extensions and show that they are compliant with LwM2M security requirements. Our performance evaluation on off-the-shelf IoT hardware shows that C2C communication outperforms server-centric deployments. First, LwM2M deployments with edge C2C communication yield a  90 throughput compared to common server-centric scenarios, while keeping a small memory overhead of  8 rate degrades when resource update intervals drop below 100 ms.

READ FULL TEXT
research
08/14/2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

The Authentication and Authorization for Constrained Environments (ACE) ...
research
08/20/2019

Memory Forensic Analysis of MQTT Devices

Internet of Things is revolutionizing the current era with its vast usag...
research
08/25/2023

Federated Learning in IoT: a Survey from a Resource-Constrained Perspective

The IoT ecosystem is able to leverage vast amounts of data for intellige...
research
04/21/2020

Group Key Agreement in Information Centric Networks with Tree Group Diffie-Hellman

The client-server model is known to scale badly without redundant server...
research
10/10/2021

Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems

Internet of Things (IoT) is a rapidly growing industry currently being i...
research
04/20/2022

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

We present Blinded Memory (BliMe), a way to realize efficient and secure...
research
06/26/2019

Secure Client and Server Geolocation Over the Internet

In this article, we provide a summary of recent efforts towards achievin...

Please sign up or login with your details

Forgot password? Click here to reset