7 CONCLUSION
In this paper, we propose the Cap-Token option to
solve the payload ambiguity problem when applying
the capability-based access control model for an IoT
network. Because the Cap-Token option is indepen-
dent form other CoAP fields and the option knows
its size, we can prevent a capability token from being
mixed up with the contents of other CoAP fields. Be-
sides, we also propose a compression mechanism to
reduce the size of the Cap-Token option. Our evalua-
tion shows that the compression mechanism can save
the size of the Cap-Token option by 60%. This also
helps decrease the overhead (the increase in the IP
datagram size) after applying CBAC for an IoT net-
work. Our results show that the overhead of adding a
compressed Cap-Token option to a request message is
only 69%, while adding an uncompressed Cap-Token
option is 176% and directly attaching a capability to
the end of CoAP is 304%. The smaller IP datagram
size also helps generate fewer data link frame when
sending a CoAP request message over a 6LoWPAN
network.
Our future work focuses on solving the storage
consumption problem on the requester’s device. Be-
cause the current design only allows a capability to-
ken to be used to access a particular device, a re-
quester has to acquire at least N capability tokens if
attempting to access the resources hosted on N IoT
devices. This may consume a large amount of stor-
age space in a large IoT use case, such as smart city.
Hence, we plan to design a new type of capability to-
ken to tackle this problem.
REFERENCES
Alghamdi, T., Lasebae, A., and Aiash, M. (2013). Security
Analysis of the Constrained Application Protocol in
the Internet of Things. In Second International Con-
ference on Future Generation Communication Tech-
nology, pages 163–168.
Dworkin, M. (2007). Recommendation for Block Cipher
Modes of Operation: Galois/Counter Mode (GCM)
and GMAC. Technical report, National Institute of
Standards and Technology.
Granjal, J., Monteiro, E., and Sa Silva, J. (2015). Secu-
rity for the Internet of Things: A Survey of Existing
Protocols and Open Research Issues. IEEE Commu-
nications Surveys Tutorials, 17(3):1294–1312.
Gusmeroli, S., Piccione, S., and Rotondi, D. (2013). A
Capability-based Security Approach to Manage Ac-
cess Control in the Internet of Things. Mathematical
and Computer Modelling, 58:1189–1205.
Hern
´
andez, J. L., Moreno, M. V., Jara, A. J., and Skarmeta,
A. F. (2014). A Soft Computing Based Location-
aware Access Control for Smart Buildings. Soft Com-
puting, 18(9):1659–1674.
Hern
´
andez-Ramos, J. L., Jara, A. J., Mar
´
ın, L., and G
´
omez,
A. F. S. (2014). DCapBAC: Embedding Authorization
Logic into Smart Things through ECC Optimizations.
International Journal of Computer Mathematics, 0:1–
22.
Hern
´
andez-Ramos, J. L., Jara, A. J., Mar
´
ın, L., and
Skarmeta, A. F. (2013). Distributed Capability-based
Access Control for the Internet of Things. Journal of
Internet Services and Information Security, 3:1–16.
Hui, J. W. and Thubert, P. (2011). Compression Format for
IPv6 Datagrams over IEEE 802.15.4-Based Networks.
RFC 6282.
Hui, J. W. and Vasseur, J. (2012). The Routing Protocol
for Low-Power and Lossy Networks (RPL) Option for
Carrying RPL Information in Data-Plane Datagrams.
RFC 6553.
Mahalle, P., Anggorojati, B., Prasad, N., and Prasad, R.
(2012a). Identity Driven Capability based Access
Control (ICAC) Scheme for the Internet of Things.
In 2012 IEEE International Conference on Advanced
Networks and Telecommunications Systems, pages
49–54.
Mahalle, P., Anggorojati, B., Prasad, N., and Prasad,
R. (2012b). Identity Establishment and Capability
based Access Control (IECAC) Scheme for Internet
of Things. In 15th International Symposium on Wire-
less Personal Multimedia Communications (WPMC),
pages 187–191.
Montenegro, G., Kushalnagar, N., Hui, J. W., and Culler,
D. E. (2007). Transmission of IPv6 Packets over IEEE
802.15.4 Networks. RFC 4944.
Nguyen, K. T., Laurent, M., and Oualha, N. (2015). Survey
on Secure Communication Protocols for the Internet
of Things. Ad Hoc Networks, 32:17–31.
Pereira, P., Eliasson, J., and Delsing, J. (2014). An Authen-
tication and Access Control Framework for CoAP-
based Internet of Things. In 40th Annual Confer-
ence of the IEEE Industrial Electronics Society, pages
5293–5299.
Rescorla, E. and Modadugu, N. (2012). Datagram Trans-
port Layer Security Version 1.2. RFC 6347.
Roman, R., Zhou, J., and Lopez, J. (2013). On the Features
and Challenges of Security and Privacy in Distributed
Internet of Things. Computer Networks, 57(10):2266–
2279.
Seitz, L. and Gerdes, S. (2015). Use Cases for Authentica-
tion and Authorization in Constrained Environments.
IETF Draft.
Seitz, L., Selander, G., and Gehrmann, C. (2013). Autho-
rization Framework for the Internet-of-Things. In 14th
IEEE International Symposium and Workshops on a
World of Wireless, Mobile and Multimedia Networks,
pages 1–6.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The Con-
strained Application Protocol (CoAP). RFC 7252.
Winter, T., Thubert, P., Brandt, A., Hui, J. W., Kelsey,
R., Levis, P., Pister, K., Struik, R., Vasseur, J., and
CoAP Option for Capability-Based Access Control for IoT-Applications
273