Jump to ContentJump to Main Navigation
Show Summary Details
More options …

PIK - Praxis der Informationsverarbeitung und Kommunikation

Fachzeitschrift für den Einsatz von Informationssystemen

Ed. by Müller, Paul

Online
ISSN
1865-8342
See all formats and pricing
More options …
Volume 36, Issue 1

Issues

End-to-End Security for Internet-Connected Smart Objects

Jens Hiller
Published Online: 2013-02-08 | DOI: https://doi.org/10.1515/pik-2012-0141

Abstract:

Today, lightweight IP stacks enable highly constrained devices like smart objects to exchange information with each other as well as with backend services over the Internet. To protect the confidentiality and integrity of data that is gathered by smart objects, e.g., in industrial monitoring or e-health systems, the communicating peers need to authenticate each other and encrypt the transmitted data. Security protocols thereby must handle the constrained resources of smart objects that only offer a few KB of RAM and ROM, are equipped with CPUs of a few MHz and often are battery-powered. In this article, we provide a brief overview and analysis of the IP security protocols DTLS, Minimal IKE, and HIP DEX that are currently in focus of standardization efforts. We then present our optimization for the HIP DEX DoS protection mechanism and hint at further improvements that are discussed in the work this article is based on. Finally, we provide a detailed overhead evaluation of the HIP DEX protocol based on our own implementation for smart objects.

About the article

Published Online: 2013-02-08

Published in Print: 2013-02-01


Citation Information: PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 36, Issue 1, Pages 23–29, ISSN (Online) 1865-8342, ISSN (Print) 0930-5157, DOI: https://doi.org/10.1515/pik-2012-0141.

Export Citation

© 2013 by Walter de Gruyter Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in