Skip to main content

Innovative TLS/DTLS Security Modules for IoT Applications: Concepts and Experiments

  • Conference paper
Internet of Things. IoT Infrastructures (IoT360 2015)

Included in the following conference series:

Abstract

The Internet of Things is a new technological step in the anytime, everywhere, anything IP connectivity context. Things (sensors, wearable objects, connected cars…) are equipped with computers and various communication resources. IoT devices deal with Wireless Local Area Network, Wireless Personal Area Network, Near Field Communication, or new operated radio networks with low throughput such as SIGFOX or LoRA. In this context security and trust are very critical topics, both for users and service providers. In this paper we present new and innovative security modules based on ISO7816 chips, which have been recently introduced by an IETF draft. These low cost, low power, tamper resistant devices, run TLS and DTLS stacks. DTLS is the datagram adaptation of the well known TLS protocol, which is de facto standard for the internet security. It is the security layer of the Constrained Application Protocol (CoAP) targeting sensors networks in a context of smart energy and building automation. We shortly recall TLS and DTLS features, and introduce the flights concept. We present the TLS/DTLS security module interface, which is based on previous work dealing with the EAP-TLS protocol, widely used for authentication in wireless networks and VPNs. We describe our prototype platform based on a java framework that implement a software bridge with the TLS/DTLS security module and which is compatible with the popular Raspberry Pi board. Finally we detail the experimental performances, compatible with the constraints of IoT, observed for an implementation running in a javacard.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. LoRa Alliance: LoRaWAN™ Specification, Version: V1.0, January 2015

    Google Scholar 

  2. SigFox: One network A billion dreams: M2 M and IoT redefined through cost effective and energy optimized connectivity. White paper (2015)

    Google Scholar 

  3. ISO/IEC 18092: Near Field Communication - Interface and Protocol (NFCIP-1), April 2004

    Google Scholar 

  4. Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252, June 2014

    Google Scholar 

  5. Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246, January 1999

    Google Scholar 

  6. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, April 2006

    Google Scholar 

  7. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347, April 2006

    Google Scholar 

  8. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008

    Google Scholar 

  9. Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. RFC 6347, January 2012

    Google Scholar 

  10. TLS and DTLS Security Modules, draft-urien-uta-tls-dtls-security-module-00.txt, June 2015

    Google Scholar 

  11. https://www.raspberrypi.org/

  12. Modadugu, N., Rescorla, E.: The design and implementation of datagram TLS. In: The 11th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2004

    Google Scholar 

  13. Simon, D., Aboba, B., Hurst, R.: The EAP-TLS Authentication Protocol. RFC 5216, March 2008

    Google Scholar 

  14. Urien, P.: EAP Support in Smartcard, draft-urien-eap-smartcard-29.txt, July 2015

    Google Scholar 

  15. Urien, P.: Collaboration of SSL smart cards within the WEB2 landscape. In: International Symposium on Collaborative Technologies and Systems, CTS 2009, 18–22 May 2009, pp. 187–194 (2009)

    Google Scholar 

  16. ISO 7816: Cards Identification - Integrated Circuit Cards with Contacts. The International Organization for Standardization (ISO)

    Google Scholar 

  17. Jurgensen, T.M., et al.: Smart Cards: The Developer’s Toolkit. Prentice Hall PTR, Upper Saddle River (2002). ISBN 0-130-93730-4

    Google Scholar 

  18. ETSI: Specification of the 1.8 Volt Subscriber Identity Module - Mobile Equipment (SIM - ME) interface. ETSI TS 101 116 V7.0.1

    Google Scholar 

  19. Chen, Z.: Java CardTM Technology for Smart Cards: Architecture and Programmer’s (The Java Series). Addison-Wesley, Boston (2002). ISBN 0-201-70329-7

    Google Scholar 

  20. GEMALTO: GemXpresso R4 E36/E72 PK - MultiApp ID 36 K/72 K - TOP IM GX4 Security Policy (2009)

    Google Scholar 

  21. Seggelmann, R., Tuexen, M.: DTLS Documentation, version 1.0. http://sctp.fh-muenster.de/index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pascal Urien .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Urien, P. (2016). Innovative TLS/DTLS Security Modules for IoT Applications: Concepts and Experiments. In: Mandler, B., et al. Internet of Things. IoT Infrastructures. IoT360 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 169. Springer, Cham. https://doi.org/10.1007/978-3-319-47063-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47063-4_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47062-7

  • Online ISBN: 978-3-319-47063-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics