2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) 2013
DOI: 10.1109/iwcmc.2013.6583680
|View full text |Cite
|
Sign up to set email alerts
|

Low power link layer security for IoT: Implementation and performance analysis

Abstract: In this paper, we present the implementation and performance evaluation of security functionalities at the link layer of IEEE 802.15.4-compliant IoT devices. Specifically, we implement the required encryption and authentication mechanisms entirely in software and as well exploit the hardware ciphers that are made available by our IoT platform. Moreover, we present quantitative results on the memory footprint, the execution time and the energy consumption of selected implementation modes and discuss some releva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…This involves techniques such as hardware encryption, fail-secure device design, and device-based access control mechanisms. Approaches that propose embedding security architectures, including enhancing the Datagram Transport Layer Security [16] and implementing within hardware ciphers IEEE 802.15.4-compliant link layer security procedures [17] have been suggested. Also, optimized versions of cryptographic algorithms, such as the ECDSA, have been developed for constrained environments.…”
Section: A Device Level Approachesmentioning
confidence: 99%
“…This involves techniques such as hardware encryption, fail-secure device design, and device-based access control mechanisms. Approaches that propose embedding security architectures, including enhancing the Datagram Transport Layer Security [16] and implementing within hardware ciphers IEEE 802.15.4-compliant link layer security procedures [17] have been suggested. Also, optimized versions of cryptographic algorithms, such as the ECDSA, have been developed for constrained environments.…”
Section: A Device Level Approachesmentioning
confidence: 99%
“…Some researchers propose to standardize IoT communication protocols, for example, DTLS optimization has been suggested to secure the IoT data exchange [5]. Implementation of IEEE 802.15.4-compliant link layer security procedures is advised in [6] and a lightweight encryption/decryption method for ID authentication among nodes in sensor layer has been presented in [7]. Concepts from Artificial Immune System (AIS) have been imported to detect attacks on IoT and have used those concepts to develop an IoT intrusion detection system with dynamic defense [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…Reference studies the performance of the AES‐CCM at the link layer and compares it to other well‐known cryptography schemes. The authors show that, even though AES is not the most efficient block cypher in terms of code size and time performance, its well‐known security properties, as well as the possibility to perform it in hardware, make it the most suitable solution.…”
Section: Related Workmentioning
confidence: 99%
“…At the time of this writing, several contributions already investigated the effects of security operations in IoT systems on system capabilities . Nevertheless, for the best of authors' knowledge, they only focus on the legacy IEEE802.15.4‐2011 , and no studies on IIoT networks based on TSCH are yet available (TSCH was not present in the legacy IEEE802.15.4‐2011 standard, while it was introduced in the IEEE802.15.4e amendment, in 2012, and maintained in the latest version of the standard, that is, IEEE802.15.4‐2015 ).…”
Section: Introductionmentioning
confidence: 99%