Skip to main content

TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2019)

Abstract

Transport Layer Security (TLS) is one of the most popular security protocols for end-to-end communications. The handshake process of TLS has high computation complexity and heavy delay, while the devices in Internet of Things (IoT) always have limited resources. Therefore, it is hard to deploy TLS in IoT. To tackle this problem, we propose a novel method to simplify the TLS handshake protocol based on Software Defined Network (SDN) for a general end-to-end communication scenario. Firstly, instead of doing the Diffie-Hellman key exchange to calculate the premaster secret of TLS, the controller is used to generate the premaster secret dynamically and then distributes this secret to the IoT devices through the encrypted channel between the SDN switch and the controller. Secondly, the certificate verification of TLS is transferred from the IoT devices to the more powerful controller. Furthermore, the security of our simplified protocol is validated by the deduction of BAN logic and the analysis for malicious attacks. The experimental results show that our protocol reduces both the latency in the whole handshake process and the computational overhead in the IoT devices compared with the traditional TLS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. OpenFlow switch specification, March 2015. https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf

  2. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 426(1871), 233–271 (1989). https://doi.org/10.1098/rspa.1989.0125

    Article  MathSciNet  MATH  Google Scholar 

  3. Cai, J., et al.: A handshake protocol with unbalanced cost for wireless updating. IEEE Access 6, 18570–18581 (2018). https://doi.org/10.1109/ACCESS.2018.2820086

    Article  Google Scholar 

  4. Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2. RFC 5246, August 2008. https://tools.ietf.org/html/rfc5246

  5. Dragomir, D., Gheorghe, L., Costea, S., Radovici, A.: A survey on secure communication protocols for IoT systems. In: 2016 International Workshop on Secure Internet of Things (SIoT), pp. 47–62, September 2016. https://doi.org/10.1109/SIoT.2016.012

  6. Farris, I., Taleb, T., Khettab, Y., Song, J.: A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tutorials 21(1), 812–837 (2019). https://doi.org/10.1109/COMST.2018.2862350

    Article  Google Scholar 

  7. Feng, Z., Hu, G.: Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans. Control Syst. Technol. 1–12 (2019). https://doi.org/10.1109/TCST.2019.2892032

  8. Gomez, C., Arcia-Moret, A., Crowcroft, J.: TCP in the Internet of Things: from ostracism to prominence. IEEE Internet Comput. 22(1), 29–41 (2018). https://doi.org/10.1109/MIC.2018.112102200

    Article  Google Scholar 

  9. Gueron, S., Krasnov, V.: Fast prime field elliptic-curve cryptography with 256-bit primes. J. Crypt. Eng. 5(2), 141–151 (2015). https://doi.org/10.1007/s13389-014-0090-x

    Article  Google Scholar 

  10. Gupta, V., Stebila, D., Fung, S., Shantz, S.C., Gura, N., Eberle, H.: Speeding up secure Web transactions using elliptic curve cryptography. In: NDSS (2004)

    Google Scholar 

  11. Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based Internet of Things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 284–292, June 2014. https://doi.org/10.1109/SAHCN.2014.6990364

  12. Koponen, T., et al.: Onix: a distributed control platform for large-scale production networks. In: OSDI, vol. 10, pp. 1–6 (2010)

    Google Scholar 

  13. Malik, K.M., Malik, H., Baumann, R.: Towards vulnerability analysis of voice-driven interfaces and countermeasures for replay attacks. In: 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 523–528, March 2019. https://doi.org/10.1109/MIPR.2019.00106

  14. Mirsky, Y., Kalbo, N., Elovici, Y., Shabtai, A.: Vesper: using echo analysis to detect man-in-the-middle attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6), 1638–1653 (2019). https://doi.org/10.1109/TIFS.2018.2883177

    Article  Google Scholar 

  15. Mzid, R., Boujelben, M., Youssef, H., Abid, M.: Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography. In: 2010 International Conference on Wireless and Ubiquitous Systems, pp. 1–8, October 2010. https://doi.org/10.1109/ICWUS.2010.5671367

  16. Park, J., Kang, N.: Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 28–33, October 2014. https://doi.org/10.1109/ICTC.2014.6983078

  17. Park, J., Kwon, H., Kang, N.: IoT–cloud collaboration to establish a secure connection for lightweight devices. Wireless Netw. 23(3), 681–692 (2017). https://doi.org/10.1007/s11276-015-1182-y

    Article  Google Scholar 

  18. Peng, C., Zhang, Q., Tang, C.: Improved TLS handshake protocols using identity-based cryptography. In: 2009 International Symposium on Information Engineering and Electronic Commerce, pp. 135–139, May 2009. https://doi.org/10.1109/IEEC.2009.33

  19. Pittoli, P., David, P., Noël, T.: DTLS improvements for fast handshake and bigger payload in constrained environments. In: Mitton, N., Loscri, V., Mouradian, A. (eds.) ADHOC-NOW 2016. LNCS, vol. 9724, pp. 251–262. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40509-4_18

    Chapter  Google Scholar 

  20. Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2. RFC 6347 (2012). https://tools.ietf.org/html/rfc6347

  21. Seo, J., et al.: An ECDH-based light-weight mutual authentication scheme on local SIP. In: 2015 Seventh International Conference on Ubiquitous and Future Networks, pp. 871–873, July 2015. https://doi.org/10.1109/ICUFN.2015.7182668

  22. Tiburski, R.T., Amaral, L.A., de Matos, E., de Azevedo, D.F.G., Hessel, F.: Evaluating the use of TLS and DTLS protocols in IoT middleware systems applied to E-health. In: 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC), pp. 480–485, January 2017. https://doi.org/10.1109/CCNC.2017.7983155

  23. Tootoonchian, A., Ganjali, Y.: HyperFlow: a distributed control plane for OpenFlow. In: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, p. 3 (2010)

    Google Scholar 

  24. Wu, D., Li, J., Das, S.K., Wu, J., Ji, Y., Li, Z.: A novel distributed denial-of-service attack detection scheme for software defined networking environments. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6, May 2018. https://doi.org/10.1109/ICC.2018.8422448

  25. Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.R.: A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 56(2), 30–36 (2018). https://doi.org/10.1109/MCOM.2018.1700621

    Article  Google Scholar 

Download references

Acknowledgments

We appreciate the financial support from Ministry of Education, Singapore through the Academic Research Fund (AcRF) Tier 1 for the project of 2018-T1-001-092. This work is also supported by Project U1603261 supported by Joint Funds of National Natural Science Foundation of China and Xinjiang.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maode Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yan, L., Ma, M., Ma, Y. (2019). TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24907-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24906-9

  • Online ISBN: 978-3-030-24907-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics