Abstract
In Delay/Disruption-Tolerant Networks, man-in-the-middle attacks are easy: due to the store-carry-forward principle, an attacker can simply place itself on the route between source and destination to eavesdrop or alter bundles. This weakness is aggravated in networks, where devices are energy-constrained but the attacker is not. To protect against these attacks, we design and implement μDTNSec, a security layer for Delay/Disruption-Tolerant Networks on microcontrollers. Our design establishes a public key infrastructure with lightweight certificates as an extension to the Bundle Protocol. It has been fully implemented as an addition to μDTN on Contiki OS and uses elliptic curve cryptography and hardware-backed symmetric encryption. In this enhanced version of μDTNSec, public key identity bindings are validated by exchanging certificates using neighbor discovery. μDTNSec provides a signature mode for authenticity and a sign-then-encrypt mode for added confidentiality. Our performance evaluation shows that the choice of the curve dominates the influence of the payload size. We also provide energy measurements for all operations to show the feasibility of our security layer on energy-constrained devices. Because a high quality source of randomness is required, we evaluated the random number generators by the AT86RF231 radio, its successor AT86RF233, and one based on the noise of the A/D converter. We found that only AT86RF233 provides the required quality.








Similar content being viewed by others
Notes
The ATmega1284P [44] of the INGA platform runs with 8 MHz and supports a maximum SPI data rate of f/2.
References
Schürmann D, von Zengen G, Priedigkeit M, Wolf L (2017) uDTNSec: a security layer for disruption-tolerant networks on microcontrollers. In: Mediterranean ad hoc networking workshop (Med-Hoc-Net), pp 1–7
Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of IoT: applications, challenges, and opportunities with China perspective. IEEE Int Things J 1(4):349–359
von Zengen G, Büsching F, Pöttner W-B, Wolf L (2012) An overview of μDTN: unifying DTNs and WSNs. In: Proceedings of the 11th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN), Darmstadt
Burleigh S, Scott K (2007) Bundle protocol specification. RFC 5050
Ellard D, Altman R, Gladd A, Brown D, in’t Velt R (2015) DTN IP Neighbor Discovery (IPND). draft-irtf-dtnrg-ipnd-03
Symington S, Farrell S, Weiss H, Lovell P (2011) Bundle security protocol specification. RFC 6257
Schildt S, Morgenroth J, Pöttner W-B, Wolf L (2011) IBR-DTN: a lightweight, modular and highly portable bundle protocol implementation. Electron Commun EASST 37:1–11
DTN2 Reference Implementation
Burleigh S (2011) Compressed bundle header encoding (CBHE). RFC 6260
Pöttner W-B, Büsching F, von Zengen G, Wolf L (2012) Data elevators: applying the bundle protocol in delay tolerant wireless sensor networks. In: The ninth IEEE international conference on mobile ad-hoc and sensor systems (MASS), Las Vegas
Rottmann S, Hartung R, Käberich J, Wolf L (2016) Amphisbaena: a two-platform DTN node. In: The 13th international conference on mobile ad-hoc and sensor systems (MASS 2016), Brasilia
Feldmann M, Walter F (2015) μ PCN—a bundle protocol implementation for microcontrollers. In: 2015 international conference on wireless communications signal processing (WCSP)
Nedevschi S, Patra R (2003) DTNLite: a reliable data transfer architecture for sensor networks. CS294-1: deeply embedded networks (Lecture)
Trappe W, Howard R, Moore RS (2015) Low-energy security: limits and opportunities in the internet of things. IEEE Secur Priv 13(1):14–21
Gura N, Patel A, Wander A, Eberle H, Shantz S C (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Cryptographic hardware and embedded systems (CHES). Springer, pp 119–132
NIST (2016) Recommendation for key management. Special Publication 800-57 Part 1 Rev. 4
Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11–12):2314–2341
Szczechowiak P, Oliveira LB, Scott M, Collier M, R Dahab (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone R (ed) Wireless sensor networks, volume 4913 of lecture notes in computer science. Springer, pp 305–320
Oliveira LB, Dahab R (2006) Pairing-based cryptography for sensor networks. In: 5th IEEE international symposium on network computing and applications, Cambridge
Oliveira LB, Aranha DF, Gouvêa C PL, Scott M, Câmara DF, López J, Dahab R (2011) TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput Commun 34(3):485–493. Special Issue of Computer Communications on Information and Future Communication Security
Aranha DF, Gouvêa CPL RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic
Sethi M, Arkko J, Keranen A (2012) End-to-end security for sleepy smart object networks. In: IEEE 37th conference on local computer networks workshops (LCN workshops), pp 964–972
de Clercq R, Uhsadel L, Van Herrewege A, Verbauwhede I (2014) Ultra low-power implementation of ECC on the ARM Cortex-M0 + . In: Proceedings of the 51st annual design automation conference (DAC). ACM, New York, pp 112:1–112:6
Atmel Corporation. AT86RF231/ZU/ZF datasheet
Schürmann D, Büsching F, Willenborg S, Wolf L (2017) RAIM: redundant array of independent motes. In: Conference on networked systems (NetSys’17), Göttingen
Karlof C, Sastry N, Wagner D (2004) TinySec a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on embedded networked sensor systems (SenSys ’04). ACM, New York, pp 162–175
Doriguzzi Corin R, Russello G, Salvadori E (2011) TinyKey: a light-weight architecture for wireless sensor networks securing real-world applications. In: Eighth international conference on wireless on-demand network systems and services (WONS), pp 68–75
Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. In: 6th international symposium on information processing in sensor networks (IPSN), IEEE, pp 479–488
Liu A, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International conference on information processing in sensor networks (IPSN’08). IEEE, pp 245–256
Casado L, Tsigas P (2009) ContikiSec: a secure network layer for wireless sensor networks under the contiki operating system. In: Identity and privacy in the internet age, pp 133–147
Capossele A, Cervo V, De Cicco G, Petrioli C (June 2015) Security as a CoAP resource: an optimized DTLS implementation for the IoT. In: 2015 IEEE international conference on communications (ICC), pp 549–554
David PP, Noël T (2016) DTLS improvements for fast handshake and bigger payload in constrained environments. In: Mitton N, Loscri V, Mouradian A (eds) Ad-hoc, mobile, and wireless networks. Springer International Publishing, Cham, pp 251–262
Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur Gener Comput Syst 64:108–124
‘Bg’. AVR–Crypto–Lib
SEC 2 SECG (January 2010) Recommended elliptic curve domain parameters. In: Standards for efficient cryptography group, Certicom Corp
Büsching F, Kulau U, Wolf L (2012) Architecture and evaluation of INGA—an inexpensive node for general applications. In: IEEE sensors. IEEE, Taipei, pp 842–845
SEC 1 SECG (2009) Elliptic curve cryptography, Standards for Efficient Cryptography Group, Certicom Corp
Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63
Hartung R, Kulau U, Wolf LC (2016) Demo; PotatoScope—scalable and dependable distributed energy measurement for WSNs. In: IEEE SECON 2016 conference proceedings. London
Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and RSA digital signatures. Technical report, University of Michigan, College of Engineering
Dunkels A, Gronvall B, Voigt T (2004) Contiki—a lightweight and flexible operating system for tiny networked sensors. In: Proceedings of the 29th annual IEEE international conference on local computer networks, LCN ’04. IEEE Computer Society, Washington, DC, pp 455–462
Brown RG (2011) Dieharder: a random number test suite v3.31.1
Atmel Corporation. Low Power 2.4 GHz Transceiver for ZigBee IEEE 802.15.4 6LoWPAN (2009)
Atmel Corporation (2009) 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash - ATmega1284P
Atmel Corporation (July 2014) Low Power 2.4 GHz Transceiver for ZigBee, IEEE 802.15.4, 6LoWPAN, RF4CE, SP100, WirelessHART, and ISM Applications - AT86RF233
Author information
Authors and Affiliations
Corresponding author
Additional information
This paper is an extended version of “D. Schürmann, G. von Zengen, M. Priedigkeit, L. Wolf: μDTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers” [1].
Rights and permissions
About this article
Cite this article
Schürmann, D., von Zengen, G., Priedigkeit, M. et al. μDTNSec: a security layer with lightweight certificates for Disruption-Tolerant Networks on microcontrollers. Ann. Telecommun. 73, 589–600 (2018). https://doi.org/10.1007/s12243-018-0655-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-018-0655-2