Efficient Reduction of the Transmission Delay of the Authentication Based Elliptic Curve Cryptography in 6LoWPAN Wireless Sensor Networks in the Internet of Things

被引:4
作者
Bettoumi, Balkis [1 ,2 ]
Bouallegue, Ridha [1 ]
机构
[1] Univ Carthage, Innov COM Lab, Sup Com, Carthage, Tunisia
[2] Natl Engn Sch Tunis, Tunis, Tunisia
来源
IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) | 2021年
关键词
Authentication; Wireless Sensor Network; Internet of Things; 6LoWPAN; CoAP; RPL; Mesh-under;
D O I
10.1109/IWCMC51323.2021.9498578
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Network (WSN) is considered as the backbone of Internet of Things (IoT) networks. Authentication is the most important phase that guarantees secure access to such networks but it is more critical than that in traditional Internet because the communications are established between constrained devices that could not compute heavy cryptographic primitives. In this paper, we are studying with real experimentation the efficiency of HIP Diet EXchange header (HIP DEX) protocol over IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) in IoT. The adopted application layer protocol is Constrained Application Protocol (CoAP) and as a routing protocol, the Routing Protocol for Low power and lossy networks (RPL). The evaluation concerns the total End-to-End transmission delays during the authentication process between the communicating peers regarding the processing, propagation, and queuing times' overheads results. Most importantly, we propose an efficient handshake packets' compression header, and we detailed a comparison of the above evaluation's criteria before and after the proposed compression. Obtained results are very encouraging and reinforce the efficiency of HIP DEX in IoT networks during the handshake process of constrained nodes.
引用
收藏
页码:1471 / 1476
页数:6
相关论文
共 15 条
[1]  
Bettoumi Balkis, 2018, EVALUATION AUTHENTIC
[2]  
Chen Qian-Bin, 2010, 2010 IEEE YOUTH C IN
[3]  
Dulman Stefan, 2009, NETWORKED EMBEDDED S, V1st
[4]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[5]  
Henderson TR, 2003, IEEE WCNC, P2120
[6]   P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things [J].
Hossain, Mahmud ;
Hasan, Ragib .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) :555-571
[7]  
Hui J., 2011, COMPR FORM IPV6 DAT
[8]   E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks [J].
Kanuch, Peter ;
Macko, Dominik .
SENSORS, 2019, 19 (22)
[9]   HIP security architecture for the IP-based Internet of Things [J].
Meca, Francisco Vidal ;
Ziegeldorf, Jan Henrik ;
Sanchez, Pedro Moreno ;
Morchon, Oscar Garcia ;
Kumar, Sandeep S. ;
Keoh, Sye Loong .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :1331-1336
[10]  
Moskowitz R., 2020, HIP DIET EXCHANGE DE, V14