Evaluating CoAP, OSCORE, DTLS and HTTPS for Secure Device Communication

Kristofer Nedergaard, Bhupjit Singh*, Birger Andersen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

The purpose of this paper is to explore the differences and relations between the protocols CoAP, OSCORE, DTLS and HTTPS. Our focus is at performance and the general security benefits of the different protocols. We evaluate the feasibility of using CoAP encrypted with OSCORE or DTLS as opposed to using HTTPS/1.1 or HTTPS/3. We find the CoAP based solutions to be more performant than HTTPS, however we also find them to be harder to implement, less widespread and potentially more insecure than HTTPS. From these findings, in most scenarios we recommend implementing solutions based on HTTPS if the performance and overhead can be tolerated.
Original languageEnglish
Title of host publicationProceedings of EAI International Conference on the Internet of Everything
EditorsTeresa Pereira, John Impagliazzo, Henrique Santos
Number of pages15
PublisherSpringer
Publication date2023
Pages117-132
ISBN (Print)978-3-031-25221-1
ISBN (Electronic)978-3-031-25222-8
DOIs
Publication statusPublished - 2023
Event2022 EAI International Conference on the Internet of Everything - Online conference, Portugal
Duration: 16 Sept 202217 Sept 2022
https://ioecon.eai-conferences.org/2022/

Conference

Conference2022 EAI International Conference on the Internet of Everything
LocationOnline conference
Country/TerritoryPortugal
Period16/09/202217/09/2022
Internet address
SeriesLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume458
ISSN1867-8211

Keywords

  • CoAP
  • OSCORE
  • DTLS
  • HTTPS
  • Secure communication

Fingerprint

Dive into the research topics of 'Evaluating CoAP, OSCORE, DTLS and HTTPS for Secure Device Communication'. Together they form a unique fingerprint.

Cite this