Version 1
: Received: 3 July 2024 / Approved: 4 July 2024 / Online: 4 July 2024 (10:58:26 CEST)
How to cite:
El-Hajj, M.; Trifonova, R. Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC. Preprints2024, 2024070427. https://doi.org/10.20944/preprints202407.0427.v1
El-Hajj, M.; Trifonova, R. Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC. Preprints 2024, 2024070427. https://doi.org/10.20944/preprints202407.0427.v1
El-Hajj, M.; Trifonova, R. Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC. Preprints2024, 2024070427. https://doi.org/10.20944/preprints202407.0427.v1
APA Style
El-Hajj, M., & Trifonova, R. (2024). Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC. Preprints. https://doi.org/10.20944/preprints202407.0427.v1
Chicago/Turabian Style
El-Hajj, M. and Reneta Trifonova. 2024 "Enhancing Cybersecurity in IoT Networks: Exploring Lightweight Key Establishment Using OSCORE and EDHOC" Preprints. https://doi.org/10.20944/preprints202407.0427.v1
Abstract
The widespread adoption of IoT networks has revolutionized modern life thanks to their diverse range of applications. With their increased usage, the need to transfer data securely has never been more vital. Often IoT devices are battery-driven and possess limited processing and storage capabilities. In response to those limitations, there has been a shift towards the implementation of resource-efficient and lighter protocols. This research aims to evaluate how lightweight key establishment through Object Security for Constrained RESTful Environments (OSCORE) and Ephemeral Diffie-Hellman Over COSE (EDHOC) can enhance cybersecurity in IoT networks where resources are limited. The study aims to explore different key management approaches and the effects of certificates on security, efficiency, and power consumption. The research methodology consists of the practical implementation of the protocols in a physical system where factors such as the impact of hardware acceleration on computational overhead and overall power consumption will be assessed. Furthermore, the study will verify the cost of resources and overall efficiency, evaluating them against real-world scenarios. The expected contributions of this study are insights into the tradeoffs between security, power consumption, and efficiency in resource-limited IoT environments.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.