|
|
# Welcome to the jRECMA Wiki
|
|
|
With the Web being its most prominent and important technical implementation, REST (Representational State Transfer) [1] has been established as an lightweight approach for designing distributed-systems that scale at large. Therefore, the architectural principles has gained traction in the Internet of Things (IoT) domain likewise.
|
|
|
With the Web being its most prominent and important technical implementation, REST (Representational State Transfer) has been established as an lightweight approach for designing distributed-systems that scale at large. Therefore, the architectural principles has gained traction in the Internet of Things (IoT) domain likewise.
|
|
|
|
|
|
CoAP is an standardized REST-based protocol for constrained nodes and networks which is based on HTTP. As with HTTP, the communication in REST-based CoAP applications are mostly secured by transport-oriented protection, i.e. (D)TLS. In high-scalable distributed systems which contains multiple intermediaries, e.g., load balancer, cache server or proxies to promote scalability, transport security is not a sufficient safeguard. Hence, application layer security mechanism providing end-to-end protection are mandatory.
|
|
|
|
... | ... | @@ -58,8 +58,10 @@ Key-ID: <$kid$> |
|
|
{"item":"pork"}
|
|
|
```
|
|
|
|
|
|
For more details, please take a look at [1], [2] and [3].
|
|
|
|
|
|
## Signing CoAP requests with jRECMA
|
|
|
This an example showing how to sign a CoAP request with HMAC-SHA256.
|
|
|
This an example showing how to sign a CoAP request with jRECMA using HMAC-SHA256.
|
|
|
```java
|
|
|
byte[] key = Base64.getMimeDecoder().decode(base64Key);
|
|
|
|
... | ... | @@ -94,4 +96,14 @@ client.sendCoapRequest(req, new InetSocketAddress("coap.me", 5683),new ClientCal |
|
|
|
|
|
|
|
|
System.out.println(req);
|
|
|
``` |
|
|
\ No newline at end of file |
|
|
```
|
|
|
|
|
|
# References
|
|
|
[1] Luigi Lo Iacono and Hoai Viet Nguyen: "Authentication Scheme for REST", in International Conference on Future Network Systems and Security (FNSS), 2015.
|
|
|
[Online]. Available at: [http://link.springer.com/chapter/10.1007/978-3-319-19210-9_8](http://link.springer.com/chapter/10.1007/978-3-319-19210-9_8)
|
|
|
|
|
|
[2] Hoai Viet Nguyen and Luigi Lo Iacono: "REST-ful CoAP Message Authentication", in International Workshop on Secure Internet of Things (SIoT), in conjunction with the European Symposium on Research in Computer Security (ESORICS), 2015.
|
|
|
[Online]. Available at: [https://dx.doi.org/10.1109/SIOT.2015.8](https://dx.doi.org/10.1109/SIOT.2015.8)
|
|
|
|
|
|
[3] Hoai Viet Nguyen and Luigi Lo Iacono: "RESTful IoT Authentication Protocols", in Mobile Security and Privacy - Advances, Challenges and Future Research Directions, Elsevier/Syngress, 2016.
|
|
|
[Online]. Available at: [http://dx.doi.org/10.1016/B978-0-12-804629-6.00010-9](http://dx.doi.org/10.1016/B978-0-12-804629-6.00010-9) |
|
|
\ No newline at end of file |