Performance Evaluation of end-to-end security protocols in an Internet of Things

被引:0
作者
De Rubertis, Antonio [1 ]
Mainetti, Luca [1 ]
Mighali, Vincenzo [1 ]
Patrono, Luigi [1 ]
Sergi, Ilaria [1 ]
Stefanizzi, Maria Laura [1 ]
Pascali, Stefano [1 ]
机构
[1] Univ Salento, Dept Innovat Engn, Lecce, Italy
来源
2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013) | 2013年
关键词
Security; IPSec; DTLS; Performance evaluation; WSN; Contiki RTOS; IoT; Test bed;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks are destined to play a fundamental role in the next-generation Internet, which will be characterized by the Machine-to-Machine paradigm, according to which, embedded devices will actively exchange information, thus enabling the development of innovative applications. It will contribute to assert the concept of Internet of Things, where end-to- end security represents a key issue. In such context, it is very important to understand which protocols are able to provide the right level of security without burdening the limited resources of constrained networks. This paper presents a performance comparison between two of the most widely used security protocols: IPSec and DTLS. We provide the analysis of their impact on the resources of embedded devices. For this purpose, we have modified existing implementations of both protocols to make them properly run on our hardware platforms, and we have performed an extensive experimental evaluation study. The achieved results are not a consequence of a classical simulation campaign, but they have been obtained in a real scenario that uses software and hardware typical of the current technological developments. Therefore, they can help network designers to identify the most appropriate secure mechanism for end-to-end IP communications involving constrained devices.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 2012, RFC 6347
[2]  
[Anonymous], 2013, J COMMUN SOFTWARE SY, DOI DOI 10.24138/JCOMSS.V9I2.149
[3]  
[Anonymous], IETF STANDARDS
[4]  
[Anonymous], 2007, RFC4944
[5]  
[Anonymous], J COMMUNICATION SOFT
[6]  
[Anonymous], 1 IEEE WORKSH EMB NE
[7]  
[Anonymous], CONSTRAINED IN PRESS
[8]  
[Anonymous], P 20 INT C SOFTW TEL
[9]  
[Anonymous], 6282 RFC
[10]  
[Anonymous], 2011, P 2011 INT C DISTR C