{"title":"Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks","authors":"A. Fournaris, S. Giannoulis, C. Koulamas","doi":"10.1109/NTMS.2019.8763857","DOIUrl":null,"url":null,"abstract":"In the past few years, Internet Engineering Task Force (IETF) has standardized \"lightweight\" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2019.8763857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the past few years, Internet Engineering Task Force (IETF) has standardized "lightweight" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.