Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device

IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are...

Full description

Bibliographic Details
Main Author: Johansson, Jacob
Format: Others
Language:English
Published: Linköpings universitet, Institutionen för datavetenskap 2019
Subjects:
IoT
ACE
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161347
id ndltd-UPSALLA1-oai-DiVA.org-liu-161347
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-liu-1613472019-10-30T22:21:02ZImplementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained deviceengImplementering och utvärdering av ACE-ramverketJohansson, JacobLinköpings universitet, Institutionen för datavetenskap2019IoTACE6LoWPANComputer SystemsDatorsystemIoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are usually constrained to be as cheap and primitive asthe task allows. Most of the time, they are only used to send collected data which only re-quires a one way secure channel. However, in order to apply updates or manage the deviceremotely, the communication has to be secured both ways. There are multiple suggestionson how a two way secure channel can be established while still operating on a constraineddevice. Each security specializes in its own area e.g privacy, scalability, or simplicity. Thispaper will describe how to implement the ACE-DTLS framework and analyze the perfor-mance with respect to energy consumption and security. While ACE-DTLS is quite simpleto implement without having to understand the complex math of a key exchange, it comeswith the cost of a high overhead in order to establish a secure two way connection. It mightnot be the best suited framework for small amount of data transfers available. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161347application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic IoT
ACE
6LoWPAN
Computer Systems
Datorsystem
spellingShingle IoT
ACE
6LoWPAN
Computer Systems
Datorsystem
Johansson, Jacob
Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
description IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are usually constrained to be as cheap and primitive asthe task allows. Most of the time, they are only used to send collected data which only re-quires a one way secure channel. However, in order to apply updates or manage the deviceremotely, the communication has to be secured both ways. There are multiple suggestionson how a two way secure channel can be established while still operating on a constraineddevice. Each security specializes in its own area e.g privacy, scalability, or simplicity. Thispaper will describe how to implement the ACE-DTLS framework and analyze the perfor-mance with respect to energy consumption and security. While ACE-DTLS is quite simpleto implement without having to understand the complex math of a key exchange, it comeswith the cost of a high overhead in order to establish a secure two way connection. It mightnot be the best suited framework for small amount of data transfers available.
author Johansson, Jacob
author_facet Johansson, Jacob
author_sort Johansson, Jacob
title Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
title_short Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
title_full Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
title_fullStr Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
title_full_unstemmed Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device
title_sort implementation and evaluationof the ace dtls framework : reducing the authentication workload of a constrained device
publisher Linköpings universitet, Institutionen för datavetenskap
publishDate 2019
url http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161347
work_keys_str_mv AT johanssonjacob implementationandevaluationoftheacedtlsframeworkreducingtheauthenticationworkloadofaconstraineddevice
AT johanssonjacob implementeringochutvarderingavaceramverket
_version_ 1719283733390950400