OSCAR: Object security architecture for the Internet of Things - Systèmes Répartis, Calcul Parallèle et Réseaux Access content directly
Journal Articles Ad Hoc Networks Year : 2015

OSCAR: Object security architecture for the Internet of Things

Malisa Vucinic
Bernard Tourancheau
Franck Rousseau
Andrzej Duda
Laurent Damon
  • Function : Author

Abstract

In this paper, we propose OSCAR, an architecture for end-to-end security in the Internet of Things. It is based on the concept of object security that relates security with the application payload. The architecture includes Authorization Servers that provide clients with Access Secrets that enable them to request resources from constrained CoAP nodes. The nodes reply with the requested resources that are signed and encrypted. The scheme intrinsically supports multicast, asynchronous traffic, and caching. We have evaluated OSCAR in two cases: 802.15.4 Low Power and Lossy Networks (LLN) and Machine-to-Machine (M2M) communication on two different hardware platforms and MAC layers on a real testbed and using the Cooja emulator. The results show that OSCAR outperforms a security scheme based on DTLS when the number of nodes increases. OSCAR also results in low energy consumption and latency.
Fichier principal
Vignette du fichier
1404.7799.pdf (6.88 Mo) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01199097 , version 1 (04-03-2024)

Identifiers

Cite

Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, et al.. OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.3-16. ⟨10.1016/j.adhoc.2014.12.005⟩. ⟨hal-01199097⟩
318 View
3 Download

Altmetric

Share

Gmail Facebook X LinkedIn More