Comparison of CoAP Security Protocols .
The Internet-Draft titled "Comparison of CoAP Security Protocols" analyzes and compares the message sizes of key exchange processes and per-packet overheads associated with various security protocols used to secure the Constrained Application Protocol (CoAP). Minimizing message sizes is crucial in constrained radio networks, such as Low-Power Wide Area Networks (LPWANs), to reduce energy consumption, latency, and completion times.
The security protocols evaluated in this document include:
- Datagram Transport Layer Security (DTLS) 1.2 and 1.3
- Transport Layer Security (TLS) 1.2 and 1.3
- Compact TLS (cTLS)
- Ephemeral Diffie-Hellman Over COSE (EDHOC)
- Object Security for Constrained RESTful Environments (OSCORE)
- Group OSCORE
The analysis considers the DTLS and TLS record layers with and without 6LoWPAN-GHC compression and examines DTLS both with and without Connection ID.
Please login to post comments