Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter February 8, 2013

End-to-End Security for Internet-Connected Smart Objects

  • Jens Hiller EMAIL logo

Abstract:

Today, lightweight IP stacks enable highly constrained devices like smart objects to exchange information with each other as well as with backend services over the Internet. To protect the confidentiality and integrity of data that is gathered by smart objects, e.g., in industrial monitoring or e-health systems, the communicating peers need to authenticate each other and encrypt the transmitted data. Security protocols thereby must handle the constrained resources of smart objects that only offer a few KB of RAM and ROM, are equipped with CPUs of a few MHz and often are battery-powered. In this article, we provide a brief overview and analysis of the IP security protocols DTLS, Minimal IKE, and HIP DEX that are currently in focus of standardization efforts. We then present our optimization for the HIP DEX DoS protection mechanism and hint at further improvements that are discussed in the work this article is based on. Finally, we provide a detailed overhead evaluation of the HIP DEX protocol based on our own implementation for smart objects.

Published Online: 2013-02-08
Published in Print: 2013-02

© 2013 by Walter de Gruyter Berlin/Boston

Downloaded on 28.3.2024 from https://www.degruyter.com/document/doi/10.1515/pik-2012-0141/html
Scroll to top button