Jump to ContentJump to Main Navigation
Show Summary Details
Volume 36, Issue 1


End-to-End Security for Internet-Connected Smart Objects

Jens Hiller
Published Online: 2013-02-08 | DOI: https://doi.org/10.1515/pik-2012-0141


Today, lightweight IP stacks enable highly constrained devices like smart objects to exchange information with each other as well as with backend services over the Internet. To protect the confidentiality and integrity of data that is gathered by smart objects, e.g., in industrial monitoring or e-health systems, the communicating peers need to authenticate each other and encrypt the transmitted data. Security protocols thereby must handle the constrained resources of smart objects that only offer a few KB of RAM and ROM, are equipped with CPUs of a few MHz and often are battery-powered. In this article, we provide a brief overview and analysis of the IP security protocols DTLS, Minimal IKE, and HIP DEX that are currently in focus of standardization efforts. We then present our optimization for the HIP DEX DoS protection mechanism and hint at further improvements that are discussed in the work this article is based on. Finally, we provide a detailed overhead evaluation of the HIP DEX protocol based on our own implementation for smart objects.

About the article

Published Online: 2013-02-08

Published in Print: 2013-02-01

Citation Information: PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 36, Issue 1, Pages 23–29, ISSN (Online) 1865-8342, ISSN (Print) 0930-5157, DOI: https://doi.org/10.1515/pik-2012-0141.

Export Citation

© 2013 by Walter de Gruyter Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in