DocumentCode :
1772797
Title :
Delegation-based authentication and authorization for the IP-based Internet of Things
Author :
Hummen, Rene ; Shafagh, Hossein ; Raza, Shahid ; Voig, Thiemo ; Wehrle, Klaus
Author_Institution :
Commun. & Distrib. Syst., RWTH Aachen Univ., Aachen, Germany
fYear :
2014
fDate :
June 30 2014-July 3 2014
Firstpage :
284
Lastpage :
292
Abstract :
IP technology for resource-constrained devices enables transparent end-to-end connections between a vast variety of devices and services in the Internet of Things (IoT). To protect these connections, several variants of traditional IP security protocols have recently been proposed for standardization, most notably the DTLS protocol. In this paper, we identify significant resource requirements for the DTLS handshake when employing public-key cryptography for peer authentication and key agreement purposes. These overheads particularly hamper secure communication for memory-constrained devices. To alleviate these limitations, we propose a delegation architecture that offloads the expensive DTLS connection establishment to a delegation server. By handing over the established security context to the constrained device, our delegation architecture significantly reduces the resource requirements of DTLS-protected communication for constrained devices. Additionally, our delegation architecture naturally provides authorization functionality when leveraging the central role of the delegation server in the initial connection establishment. Hence, in this paper, we present a comprehensive, yet compact solution for authentication, authorization, and secure data transmission in the IP-based IoT. The evaluation results show that compared to a public-key-based DTLS handshake our delegation architecture reduces the memory overhead by 64 %, computations by 97 %, network transmissions by 68 %.
Keywords :
IP networks; Internet of Things; cryptographic protocols; public key cryptography; DTLS connection; DTLS protocol; IP security protocols; IP-based Internet of Things; authorization functionality; delegation server; delegation-based authentication; key agreement purposes; memory-constrained devices; peer authentication; public-key cryptography; Context; Protocols; Public key cryptography; Random access memory; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference on
Conference_Location :
Singapore
Type :
conf
DOI :
10.1109/SAHCN.2014.6990364
Filename :
6990364
Link To Document :
بازگشت