Security As A Coap Resource: An Optimized Dtls Implementation For The Iot

2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)(2015)

引用 97|浏览110
暂无评分
摘要
The growing number of applications based on Internet of Things (IoT) technologies is pushing towards standardized protocol stacks for machine-to-machine (M2M) communication and the adoption of standard-based security solutions, such as the Datagram Transport Layer Security (DTLS). Despite the huge diffusion of DTLS, there is a lack of optimized implementations tailored to resource constrained devices. High energy consumption and long delays of current implementations limit their effective usage in real-life deployments. The aim of this paper is to explain how to integrate the DTLS protocol inside the Constrained Application Protocol (CoAP), exploiting Elliptic Curve Cryptography (ECC) optimizations and minimizing ROM occupancy. We have implemented our solution on an off-the-shelf mote platform and evaluated its performance. Results show that our ECC optimizations outperform priors scalar multiplication in state of the art for class 1 mote platforms, and improve network lifetime by a factor of up to 6.5 with respect to a standard-based not optimized implementation.
更多
查看译文
关键词
machine-to-machine communication,M2M communication,optimized DTLS implementation,IoT,CoAP resource,Internet of Things technology,datagram transport layer security protocol,resource constrained device,high energy consumption,long delay,constrained application protocol,elliptic curve cryptography,ECC optimization,ROM occupancy minimization
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要