End-to-end security for sleepy smart object networks
- 1 October 2012
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
We develop a new secure and energy-efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart object networks. This architecture and the communication model ensures data integrity and authenticity over a multi-hop network topology. It provides a mirroring mechanism that uses a proxy to serve data on behalf of sleeping smart objects, thereby allowing them to act as always-online web servers. A working prototype implementation of the architecture is also developed. The security features in the architecture presented in this paper are based on using strong public-key cryptography. Contrary to popular belief, our performance evaluation shows that asymmetric public-key cryptography can be implemented on small 8-bit microcontrollers without modifying the underlying cryptographic algorithms using public libraries.Keywords
This publication has 17 references indexed in Scilit:
- Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reductionInternational Journal of Applied Cryptography, 2012
- Efficient implementation of elliptic curve cryptography in wireless sensorsAdvances in Mathematics of Communications, 2010
- Wiselib: A Generic Algorithm Library for Heterogeneous Sensor NetworksLecture Notes in Computer Science, 2010
- COOJA/MSPSim: interoperability testing for wireless sensor networksPublished by European Alliance for Innovation n.o. ,2009
- Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor NodesLecture Notes in Computer Science, 2007
- Sizzle: A standards-based end-to-end security architecture for the embedded InternetPervasive and Mobile Computing, 2005
- Energy Analysis of Public-Key Cryptography for Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- Security in wireless sensor networksCommunications of the ACM, 2004
- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless NetworksLecture Notes in Computer Science, 2000