skip to main content
10.1145/2984356.2985237acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster

On the Cost of Secure Association of Information Centric Things

Published: 26 September 2016 Publication History

Abstract

Information Centric Networking (ICN) paradigms nicely fit the world of wireless sensors, whose devices have tight constraints. In this poster, we compare two alternative designs for secure association of new IoT devices in existing ICN deployments, which are based on asymmetric and symmetric cryptography respectively. While the security properties of both approaches are equivalent, an interesting trade-off arises between properties of the protocol vs properties of its implementation in current IoT boards. Indeed, while the asymmetric-keys based approach incurs a lower traffic overhead (of about 30%), we find that its implementation is significantly more energy- and time-consuming due to the cost of cryptographic operations (it requires up to 41x more energy and 8x more time).

References

[1]
Yanyong Zhang, Dipankar Raychadhuri, Luigi Alfredo Grieco, Emmanuel Baccelli, Jeff Burke, Ravi Ravindran, Guoqiang Wang, Bengt Ahlgren, and Olov Schelen. Requirements and Challenges for IoT over ICN. Internet-Draft draft-zhang-icnrg-icniot-requirements-01, Internet Engineering Task Force, April 2016. Work in Progress.
[2]
Emmanuel Baccelli, Christian Mehlis, Oliver Hahm, Thomas C. Schmidt, and Matthias Wählisch. Information centric networking in the IoT: Experiments with NDN in the wild. In Proceedings of the 1st International Conference on Information-centric Networking, ICN '14, pages 77–86, New York, NY, USA, 2014. ACM.
[3]
Jeff Burke, Paolo Gasti, Naveen Nathan, and G. Tsudik. Secure sensing over named data networking. In Network Computing and Applications (NCA), 2014 IEEE 13th International Symposium on, pages 175–180, Aug 2014.
[4]
Alberto Compagno, Mauro Conti, and Ralph Droms. OnboardICNg: a secure protocol for on-boarding IoT devices in ICN. To be presented at the 3rd ACM Conference on Information Centric Networking, 2016.
[5]
Hannes Tschofenig and Manuel Pegourie-Gonnard. Performance of state-of-the-art cryptography on ARM-based microprocessors. NIST Lightweight Cryptography Workshop 2015, July 2015. http://csrc.nist.gov/groups/ST/lwc-workshop2015/presentations/session7-vincent.pdf (consulted on 05/17/2016).
[6]
Giacomo de Meulenaer, François Gosset, François Xavier Standaert, and Olivier Pereira. On the energy cost of communication and cryptography in wireless sensor networks. In 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pages 580–585, Oct 2008.
[7]
Jongdeog Lee, Krasimira Kapitanova, and Sang H. Son. The price of security in wireless sensor networks. Computer Networks, 54(17):2967 – 2978, 2010.
[8]
Hossein Shafagh, Anwar Hithnawi, Andreas Droescher, Simon Duquennoy, and Wen Hu. Talos: Encrypted query processing for the internet of things. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys '15, pages 197–210, New York, NY, USA, 2015. ACM.

Cited By

View all
  • (2023)Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on BlockchainElectronics10.3390/electronics1211253812:11(2538)Online publication date: 4-Jun-2023
  • (2018)On the Cost of Geographic Forwarding for Information-Centric ThingsIEEE Transactions on Green Communications and Networking10.1109/TGCN.2018.28672672:4(1150-1163)Online publication date: Dec-2018
  • (2018)LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart CitiesIEEE Internet of Things Journal10.1109/JIOT.2017.27252385:2(755-764)Online publication date: Apr-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
September 2016
275 pages
ISBN:9781450344678
DOI:10.1145/2984356
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2016

Check for updates

Author Tags

  1. ICN
  2. IoT
  3. Secure Association
  4. WSN

Qualifiers

  • Poster

Conference

ICN'16
Sponsor:

Acceptance Rates

ACM-ICN '16 Paper Acceptance Rate 23 of 84 submissions, 27%;
Overall Acceptance Rate 133 of 482 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on BlockchainElectronics10.3390/electronics1211253812:11(2538)Online publication date: 4-Jun-2023
  • (2018)On the Cost of Geographic Forwarding for Information-Centric ThingsIEEE Transactions on Green Communications and Networking10.1109/TGCN.2018.28672672:4(1150-1163)Online publication date: Dec-2018
  • (2018)LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart CitiesIEEE Internet of Things Journal10.1109/JIOT.2017.27252385:2(755-764)Online publication date: Apr-2018
  • (2016)SLICTProceedings of the 3rd ACM Conference on Information-Centric Networking10.1145/2984356.2988519(255-260)Online publication date: 26-Sep-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media