Skip to main content
Top

2020 | OriginalPaper | Chapter

rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices

Authors : Koen Tange, David Howard, Travis Shanahan, Stefano Pepe, Xenofon Fafoutis, Nicola Dragoni

Published in: Information and Communications Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Transport Layer Security (TLS) 1.3 protocol supports a fast zero round-trip time (0-RTT) session resumption mechanism, enabling clients to send data in their first flight of messages. This protocol has been designed with Web infrastructure in mind, and requires these first messages to not change any state on the server side, as it is susceptible to replay attacks. This is disastrous for common IoT scenarios, where sensors often transmit state-changing data to servers. As bandwidth is a huge concern in the IoT, the field stands to benefit significantly from an efficient session resumption protocol that does not suffer from these limitations. Building on the observation that in IoT scenarios the set of clients is often bounded and fairly static, we propose rTLS (ratchet TLS), an efficient 0-RTT session resumption protocol that dramatically decreases bandwidth overhead, while adding forward secrecy and break-in resilience, and is not susceptible against replay attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Authentication protocols for internet of things: A comprehensive survey. Security and Communication Networks Authentication protocols for internet of things: A comprehensive survey. Security and Communication Networks
3.
go back to reference Bergmann, O., Gerdes, S., Bormann, C.: Simple keys for simple smart objects. In: Workshop on Smart Object Security (2012) Bergmann, O., Gerdes, S., Bormann, C.: Simple keys for simple smart objects. In: Workshop on Smart Object Security (2012)
7.
go back to reference Gupta, V., et al.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. Technical report, USA (2005) Gupta, V., et al.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. Technical report, USA (2005)
8.
go back to reference Hall-Andersen, M., Wong, D., Sullivan, N., Chator, A.: NQUIC: noise-based QUIC packet protection. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC, EPIQ 2018, pp. 22–28. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3284850.3284854 Hall-Andersen, M., Wong, D., Sullivan, N., Chator, A.: NQUIC: noise-based QUIC packet protection. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC, EPIQ 2018, pp. 22–28. Association for Computing Machinery, New York (2018). https://​doi.​org/​10.​1145/​3284850.​3284854
11.
go back to reference Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication. In: 37th Annual IEEE Conference on Local Computer Networks - Workshops, pp. 956–963, October 2012. https://doi.org/10.1109/LCNW.2012.6424088 Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication. In: 37th Annual IEEE Conference on Local Computer Networks - Workshops, pp. 956–963, October 2012. https://​doi.​org/​10.​1109/​LCNW.​2012.​6424088
Metadata
Title
rTLS: Lightweight TLS Session Resumption for Constrained IoT Devices
Authors
Koen Tange
David Howard
Travis Shanahan
Stefano Pepe
Xenofon Fafoutis
Nicola Dragoni
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-61078-4_14

Premium Partner