Preprint Article Version 1 This version is not peer-reviewed

Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC

Version 1 : Received: 3 July 2024 / Approved: 4 July 2024 / Online: 4 July 2024 (10:58:26 CEST)

How to cite: El-Hajj, M.; Trifonova, R. Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC. Preprints 2024, 2024070427. https://doi.org/10.20944/preprints202407.0427.v1 El-Hajj, M.; Trifonova, R. Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC. Preprints 2024, 2024070427. https://doi.org/10.20944/preprints202407.0427.v1

Abstract

The widespread adoption of IoT networks has revolutionized modern life thanks to their diverse range of applications. With their increased usage, the need to transfer data securely has never been more vital. Often IoT devices are battery-driven and possess limited processing and storage capabilities. In response to those limitations, there has been a shift towards the implementation of resource-efficient and lighter protocols. This research aims to evaluate how lightweight key establishment through Object Security for Constrained RESTful Environments (OSCORE) and Ephemeral Diffie-Hellman Over COSE (EDHOC) can enhance cybersecurity in IoT networks where resources are limited. The study aims to explore different key management approaches and the effects of certificates on security, efficiency, and power consumption. The research methodology consists of the practical implementation of the protocols in a physical system where factors such as the impact of hardware acceleration on computational overhead and overall power consumption will be assessed. Furthermore, the study will verify the cost of resources and overall efficiency, evaluating them against real-world scenarios. The expected contributions of this study are insights into the tradeoffs between security, power consumption, and efficiency in resource-limited IoT environments.

Keywords

IoT; CoAP; OSCORE; EDHOC; Hardware Acceleration; TLS; DTLS; Key Exchange

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.