• DocumentCode
    647542
  • Title

    Performance evaluation of end-to-end security protocols in an Internet of Things

  • Author

    De Rubertis, Antonio ; Mainetti, L. ; Mighali, Vincenzo ; Patrono, L. ; Sergi, Ilaria ; Stefanizzi, M.L. ; Pascali, Stefano

  • Author_Institution
    Dept. of Innovation Eng., Univ. of Salento, Lecce, Italy
  • fYear
    2013
  • fDate
    18-20 Sept. 2013
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Wireless Sensor Networks are destined to play a fundamental role in the next-generation Internet, which will be characterized by the Machine-to-Machine paradigm, according to which, embedded devices will actively exchange information, thus enabling the development of innovative applications. It will contribute to assert the concept of Internet of Things, where end-to-end security represents a key issue. In such context, it is very important to understand which protocols are able to provide the right level of security without burdening the limited resources of constrained networks. This paper presents a performance comparison between two of the most widely used security protocols: IPSec and DTLS. We provide the analysis of their impact on the resources of embedded devices. For this purpose, we have modified existing implementations of both protocols to make them properly run on our hardware platforms, and we have performed an extensive experimental evaluation study. The achieved results are not a consequence of a classical simulation campaign, but they have been obtained in a real scenario that uses software and hardware typical of the current technological developments. Therefore, they can help network designers to identify the most appropriate secure mechanism for end-to-end IP communications involving constrained devices.
  • Keywords
    Internet of Things; computer network security; mobile communication; protocols; wireless sensor networks; DTLS security protocols; IPSec security protocols; Internet of Things; embedded devices; end-to-end IP communications; end-to-end security protocols; hardware platforms; machine-to-machine paradigm; next-generation Internet; wireless sensor networks; Contiki RTOS; DTLS; IPSec; IoT; Performance evaluation; Security; Test bed; WSN;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on
  • Conference_Location
    Primosten
  • Type

    conf

  • DOI
    10.1109/SoftCOM.2013.6671893
  • Filename
    6671893