Comparison of CoAP Security Protocols .

The Internet-Draft titled "Comparison of CoAP Security Protocols" analyzes and compares the message sizes of key exchange processes and per-packet overheads associated with various security protocols used to secure the Constrained Application Protocol (CoAP). Minimizing message sizes is crucial in constrained radio networks, such as Low-Power Wide Area Networks (LPWANs), to reduce energy consumption, latency, and completion times.

The security protocols evaluated in this document include:

  • Datagram Transport Layer Security (DTLS) 1.2 and 1.3
  • Transport Layer Security (TLS) 1.2 and 1.3
  • Compact TLS (cTLS)
  • Ephemeral Diffie-Hellman Over COSE (EDHOC)
  • Object Security for Constrained RESTful Environments (OSCORE)
  • Group OSCORE

The analysis considers the DTLS and TLS record layers with and without 6LoWPAN-GHC compression and examines DTLS both with and without Connection ID.