Sizzle: A standards based end-to-end security architecture for the embedded Internet

被引:43
作者
Gupta, V [1 ]
Millard, M [1 ]
Fung, S [1 ]
Zhu, Y [1 ]
Gura, N [1 ]
Eberle, H [1 ]
Shantz, SC [1 ]
机构
[1] Sun Microsyst Labs, Menlo Pk, CA 94025 USA
来源
Third IEEE International Conference on Pervasive Computing and Communications, Proceedings | 2005年
关键词
D O I
10.1109/PERCOM.2005.41
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces Sizzle, the first fully-implemented end-to-end security architecture for highly constrained embedded devices. According to popular perception, public-key cryptography is beyond the capabilities of such devices. We show that elliptic curve cryptography (ECC) not only makes public-key cryptography feasible on these devices, it allows one to create a complete secure web server stack including SSL, HTTP and user application that runs efficiently within very tight resource constraints. Our small footprint HTTPS stack needs less than 4KB of RAM and interoperates with an ECC-enabled version of the Mozilla web browser We have implemented Sizzle on the 8-bit Berkeley/Crossbow Mica2 '' mote '' platform where it can complete a full SSL handshake in less than 4 seconds (session reuse takes under 2 seconds) and transfer 450 bytes of application data over SSL in about 1 second. We present additional optimizations that can further improve performance. To the best of our knowledge, this is the world's smallest secure web server (in terms of both physical dimensions and resources consumed) and significantly lowers the barrier for connecting a variety of interesting new devices (e.g. home appliances, personal medical devices) to the Internet without sacrificing end-to-end security.
引用
收藏
页码:247 / 256
页数:10
相关论文
共 30 条
[11]  
GUPTA V, MOZILLA ELLIPTIC CUR
[12]  
Gupta Vipul, 2004, P 13 INT C WORLD WID, P402, DOI [10.1145/1013367.1013496, DOI 10.1145/1013367.1013496]
[13]  
Gura N., 2004, CHES 2004
[14]  
JACOBSON V, 1999, 1144 RFC IETF
[15]  
KARLOF C, 2004, ACM SENSYS NOV
[16]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[17]   Selecting cryptographic key sizes [J].
Lenstra, AK ;
Verheul, ER .
JOURNAL OF CRYPTOLOGY, 2001, 14 (04) :255-293
[18]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[19]  
*MOT CORP, TEL PROD INF
[20]  
*NIST, 2003, PUBLICATION