Content area
Full Text
Abstract-Security and privacy are the top priority for Internet of Things (IoT) followed by performance, reliability and management. Majorly used application protocols in IoT are MQTT, CoAP, XMPP, DDS and AMQP. Protocol such as 6LoWPAN and CoAP provides feature through which smart objects can integrate into the IP-driven Internet of Things. The CoAP is a specialized web transfer protocol offering simplicity, low overhead, Machine-to-Machine communications (M2M) and Machine-to-Customer (M2C). The CoAP protocol uses interactive model between application endpoints which is nothing but a request and response model. CoAP modifies some HTTP functionalities to meet the IoT requirements such as low power consumption and operation in the presence of lousy and noisy networks. CoAP allows Cross-Protocol Proxies between CoAP and HTTP. CoAP-HTTP proxy is enabled to access on HTTP server through an intermediary. Since HTTP and CoAP share the basic set of request methods, performing a CoAP request on an HTTP resources is not so different from performing it on a CoAP resource. Security services such as Confidentiality Authentication and Authorization for an application has to be ensured because endpoints have much potential vulnerability susceptible to malicious or unintentional errors. We configured the lab with CoAP Python with Eclipse IDE, Californium (Cf) CoAP framework and Copper (Cu) Firefox add-on for security testing purpose. We practically demonstrated and proved that CoAP proxy is vulnerable and succeeded to show that the information is transiting in clear text format which is susceptible for attacks or manipulation of data.
Keywords-component;
IoT, CoAP, IETF, CoAP proxy, Vulnerability, HTTP
I. Introduction
During the last decade, Internet of Things (IoT) approached our lives silently and gradually, thanks to the availability of wireless communication systems (e.g., RFID, WiFi, 4G, IEEE 802.15.x), which have been increasingly employed as technology driver for crucial smart monitoring and control applications [1-3]. Nowadays, the concept of IoT is many-folded, it embraces many different technologies, services, and standards and it is widely perceived as the angular stone of the ICT market in the next ten years, at least [4-6].
Considering that the constraints of sensing platforms and the scale factors of the IoT typically make most of the communications and security solutions employed in the Internet ill-suited for the IoT, working groups formed at standardization bodies as the Institute...