Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors

被引:4
作者
Astorga, Jasone [1 ]
Jacob, Eduardo [1 ]
Toledo, Nerea [1 ]
Aguado, Marina [1 ]
机构
[1] Univ Basque Country UPV EHU, Dept Commun Engn, Bilbao 48013, Spain
关键词
NETWORKS;
D O I
10.1016/j.compeleceng.2013.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the 6LoWPAN standard, sensors can be natively integrated into the IP world, becoming tiny information providers that are directly addressable by any Internet-connected party. To protect the information gathered by sensors from any potential attacker on the Internet, it is essential to have trustworthy real-time information about the legitimacy of every attempt to interact with a sensor. Our approach to address this issue is Ladon, a new security protocol specifically tailored to the characteristics of low capacity devices. In this paper, we study the performance of Ladon, showing that it successfully meets the requirements of the targeted environments. To that end, we evaluate the delay and energy consumption of the execution of Ladon. The obtained results show that the cost of Ladon is bounded, even in situations of high packet loss rates (20-80%) and comparable to that of other protocols that implement fewer security features. (C) 2013 The Authors. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:539 / 550
页数:12
相关论文
共 10 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], 1994, USABILITY INSPECTION, DOI [10.5555/2821575, DOI 10.5555/2821575]
[3]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[4]  
Chan HW, 2005, IEEE INFOCOM SER, P524
[5]   A comparative study of hardware architectures for lightweight block ciphers [J].
Kitsos, Paris ;
Sklavos, Nicolas ;
Parousi, Maria ;
Skodras, Athanassios N. .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (01) :148-160
[6]  
Kohvakka M., 2006, P 3 ACM INT WORKSHOP, P48
[7]  
NEUMAN C, 2005, KERBEROS NETWORK AUT, V5
[8]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[9]   Packet loss analysis of the IEEE 802.15.4 MAC without acknowledgments [J].
Shu, Feng ;
Sakurai, Taka ;
Zukerman, Moshe ;
Vu, Hai L. .
IEEE COMMUNICATIONS LETTERS, 2007, 11 (01) :79-81
[10]  
Zhu S., 2003, P 10 ACM C COMP COMM, P62, DOI [10.1145/948109.948120, DOI 10.1145/948109.948120]