Network-layer security for the Internet of Things using TinyOS and BLIP

被引:27
作者
Granjal, Jorge [1 ]
Monteiro, Edmundo [1 ]
Silva, Jorge Sa [1 ]
机构
[1] Univ Coimbra, Dept Informat Engn, Coimbra, Portugal
关键词
Internet of Things; smart objects; 6LoWPAN; compressed security headers; TinyOS; BLIP;
D O I
10.1002/dac.2444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The design of standard communications and security mechanisms for resource-constrained sensing applications and devices may provide an important contribution for its integration with the Internet and consequently towards the realization of what we nowadays identify as the Internet of Things. This vision will only be realizable if appropriate security mechanisms are available, and in this context we target the design and experimental evaluation of security mechanisms for communications at the network-layer with sensing devices (smart objects) using the standard IPv6 protocol. Our work proposes and evaluates the usage of new compressed security headers for the network layer with smart objects. We implement and evaluate what is, as far as we know, the first proposal of security at the network layer experimentally evaluated using the TinyOS operating system and its networking stack. As we verify in the course of our evaluation study, various scenarios employing network-layer secure communications involving smart objects are feasible, particularly when security mechanisms are designed to benefit from cross-layer interactions that allow the optimization of expensive cryptographic operations. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1938 / 1963
页数:26
相关论文
共 31 条
[11]  
[Anonymous], 2005, 4301 RFC
[12]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[13]  
Casado L, 2009, LECT NOTES COMPUT SC, V5838, P133, DOI 10.1007/978-3-642-04766-4_10
[14]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[15]  
Granjal J, 2010, GLOB TELECOMM CONF
[16]   Why is IPSec a viable option for Wireless Sensor Networks [J].
Granjal, Jorge ;
Silva, Ricardo ;
Monteiro, Edmundo ;
Silva, Jorge Sa ;
Boavida, Fernando .
2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, :802-807
[17]  
Grant JE, 2010, PATHOLOGICAL GAMBLING: GUIDE CLINICAL TREATMENT, P1, DOI 10.1007/978-88-470-1538-8
[18]   Sizzle: A standards based end-to-end security architecture for the embedded Internet [J].
Gupta, V ;
Millard, M ;
Fung, S ;
Zhu, Y ;
Gura, N ;
Eberle, H ;
Shantz, SC .
Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, :247-256
[19]  
Hui J., 2011, RFC 6282
[20]  
Hui JW, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P15