End-to-End Security for Internet-Connected Smart Objects


Today, lightweight IP stacks enable highly constrained devices like smart objects to exchange information with each other as well as with backend services over the Internet. To protect the confidentiality and integrity of data that is gathered by smart objects, e.g., in industrial monitoring or e-health systems, the communicating peers need to authenticate each other and encrypt the transmitted data. Security protocols thereby must handle the constrained resources of smart objects that only offer a few KB of RAM and ROM, are equipped with CPUs of a few MHz and often are battery-powered. In this article, we provide a brief overview and analysis of the IP security protocols DTLS, Minimal IKE, and HIP DEX that are currently in focus of standardization efforts. We then present our optimization for the HIP DEX DoS protection mechanism and hint at further improvements that are discussed in the work this article is based on. Finally, we provide a detailed overhead evaluation of the HIP DEX protocol based on our own implementation for smart objects.

Purchase article
Get instant unlimited access to the article.
Log in
Already have access? Please log in.

Journal + Issues

PIK is the professional journal for the use of information systems dealing with topics related to information processing and communications techniques. The only German-language journal covers the increasingly important fields of super computers, parallel computers and high-output-workstations. PIK addresses the practitioner and decisions-maker in business, science and industry.