{"title":"受限无线传感器网络CoAP端到端安全性评估","authors":"A. Fournaris, S. Giannoulis, C. Koulamas","doi":"10.1109/NTMS.2019.8763857","DOIUrl":null,"url":null,"abstract":"In the past few years, Internet Engineering Task Force (IETF) has standardized \"lightweight\" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks\",\"authors\":\"A. Fournaris, S. Giannoulis, C. Koulamas\",\"doi\":\"10.1109/NTMS.2019.8763857\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the past few years, Internet Engineering Task Force (IETF) has standardized \\\"lightweight\\\" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.\",\"PeriodicalId\":368680,\"journal\":{\"name\":\"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NTMS.2019.8763857\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2019.8763857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks
In the past few years, Internet Engineering Task Force (IETF) has standardized "lightweight" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.