Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Institutionen för datavetenskap
2019
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161347 |
id |
ndltd-UPSALLA1-oai-DiVA.org-liu-161347 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-liu-1613472019-10-30T22:21:02ZImplementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained deviceengImplementering och utvärdering av ACE-ramverketJohansson, JacobLinköpings universitet, Institutionen för datavetenskap2019IoTACE6LoWPANComputer SystemsDatorsystemIoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are usually constrained to be as cheap and primitive asthe task allows. Most of the time, they are only used to send collected data which only re-quires a one way secure channel. However, in order to apply updates or manage the deviceremotely, the communication has to be secured both ways. There are multiple suggestionson how a two way secure channel can be established while still operating on a constraineddevice. Each security specializes in its own area e.g privacy, scalability, or simplicity. Thispaper will describe how to implement the ACE-DTLS framework and analyze the perfor-mance with respect to energy consumption and security. While ACE-DTLS is quite simpleto implement without having to understand the complex math of a key exchange, it comeswith the cost of a high overhead in order to establish a secure two way connection. It mightnot be the best suited framework for small amount of data transfers available. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161347application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
IoT ACE 6LoWPAN Computer Systems Datorsystem |
spellingShingle |
IoT ACE 6LoWPAN Computer Systems Datorsystem Johansson, Jacob Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device |
description |
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are usually constrained to be as cheap and primitive asthe task allows. Most of the time, they are only used to send collected data which only re-quires a one way secure channel. However, in order to apply updates or manage the deviceremotely, the communication has to be secured both ways. There are multiple suggestionson how a two way secure channel can be established while still operating on a constraineddevice. Each security specializes in its own area e.g privacy, scalability, or simplicity. Thispaper will describe how to implement the ACE-DTLS framework and analyze the perfor-mance with respect to energy consumption and security. While ACE-DTLS is quite simpleto implement without having to understand the complex math of a key exchange, it comeswith the cost of a high overhead in order to establish a secure two way connection. It mightnot be the best suited framework for small amount of data transfers available. |
author |
Johansson, Jacob |
author_facet |
Johansson, Jacob |
author_sort |
Johansson, Jacob |
title |
Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device |
title_short |
Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device |
title_full |
Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device |
title_fullStr |
Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device |
title_full_unstemmed |
Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device |
title_sort |
implementation and evaluationof the ace dtls framework : reducing the authentication workload of a constrained device |
publisher |
Linköpings universitet, Institutionen för datavetenskap |
publishDate |
2019 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161347 |
work_keys_str_mv |
AT johanssonjacob implementationandevaluationoftheacedtlsframeworkreducingtheauthenticationworkloadofaconstraineddevice AT johanssonjacob implementeringochutvarderingavaceramverket |
_version_ |
1719283733390950400 |