Skip to main content
Erschienen in: Wireless Networks 6/2020

18.05.2020

Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks

verfasst von: Jiyong Han, Daeyoung Kim

Erschienen in: Wireless Networks | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent years have seen the development of successful internet of things (IoT) technologies based on IP-enabled data networks. Despite the growing demand for security of resource-constrained data service networks, a majority of nodes in them typically lack memory space and computational ability compared to Internet nodes. This restricts constrained nodes from implementing and operating burdensome security protocols and authentication methods. To overcome this problem, we propose a security offloading network system which expands the security coverage to constrained nodes in IPv6-based heterogeneous networks. The proposed system supports constrained nodes by offloading the handshake and data transmission of a security protocol to offloading agents. Constrained nodes can also utilize the ciphersuites of offloading agents without the burden of deploying them. The offloading server controls the registration, the authentication, and the load-balanced allocation of offloading-agents. The implementation and evaluation show the feasibility of the proposed system by presenting practical network performance analyses in respect of availability, responsiveness, protocol overhead, and validation. This research would be advantageous for constrained nodes to achieve a high level of security, lowering the cost of network devices at the same time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Bormann, C., Ersue, M., & Keranen, A. (2014). Terminology for constrained-node networks. Internet Engineering Task Force (IETF), RFC 7228. Bormann, C., Ersue, M., & Keranen, A. (2014). Terminology for constrained-node networks. Internet Engineering Task Force (IETF), RFC 7228.
3.
Zurück zum Zitat Rescorla, E., & Modadugu, N. (2012). Datagram transport layer security version 1.2. Tech. rep. Rescorla, E., & Modadugu, N. (2012). Datagram transport layer security version 1.2. Tech. rep.
4.
Zurück zum Zitat Hummen, R., Shafagh, H., Raza, S., Voig, T., & Wehrle, K. (2014). Delegation-based authentication and authorization for the ip-based internet of things. In 2014 eleventh annual IEEE international conference on sensing, communication, and networking (SECON), pp. 284–292. https://doi.org/10.1109/SAHCN.2014.6990364. Hummen, R., Shafagh, H., Raza, S., Voig, T., & Wehrle, K. (2014). Delegation-based authentication and authorization for the ip-based internet of things. In 2014 eleventh annual IEEE international conference on sensing, communication, and networking (SECON), pp. 284–292. https://​doi.​org/​10.​1109/​SAHCN.​2014.​6990364.
5.
Zurück zum Zitat Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., & Wehrle, K. (2013). Towards viable certificate-based authentication for the internet of things. In Proceedings of the 2Nd ACM workshop on hot topics on wireless network security and privacy, HotWiSec ’13, pp. 37–42. ACM, New York, NY, USA. https://doi.org/10.1145/2463183.2463193. Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., & Wehrle, K. (2013). Towards viable certificate-based authentication for the internet of things. In Proceedings of the 2Nd ACM workshop on hot topics on wireless network security and privacy, HotWiSec ’13, pp. 37–42. ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​2463183.​2463193.
6.
Zurück zum Zitat Gerdes, S., Bergmann, O., & Bormann, C. (2015). Delegated coap authentication and authorization framework (dcaf). IETF draft,. gerdes-core-dcaf-authorize-04. Gerdes, S., Bergmann, O., & Bormann, C. (2015). Delegated coap authentication and authorization framework (dcaf). IETF draft,. gerdes-core-dcaf-authorize-04.
8.
Zurück zum Zitat Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure coap for the internet of things. IEEE Sensors Journal, 13(10), 3711–3720.CrossRef Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure coap for the internet of things. IEEE Sensors Journal, 13(10), 3711–3720.CrossRef
9.
Zurück zum Zitat Tschofenig, H., & Fossati, T. (2016). Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things. Tech. rep. Tschofenig, H., & Fossati, T. (2016). Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things. Tech. rep.
16.
Zurück zum Zitat Dierks, T., & Rescorla, E. (2008). The transport layer security (tls) protocol version 1.2. Tech. rep. Dierks, T., & Rescorla, E. (2008). The transport layer security (tls) protocol version 1.2. Tech. rep.
21.
Zurück zum Zitat Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., & Alexander, R. (2012). Rpl: Ipv6 routing protocol for low-power and lossy networks. Tech. rep. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., & Alexander, R. (2012). Rpl: Ipv6 routing protocol for low-power and lossy networks. Tech. rep.
22.
Zurück zum Zitat Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. pp. 114–128. Cited By 1777. Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. pp. 114–128. Cited By 1777.
32.
Zurück zum Zitat Bormann, C. (2014). 6lowpan-ghc: generic header compression for ipv6 over low-power wireless personal area networks (6lowpans). Tech. rep. Bormann, C. (2014). 6lowpan-ghc: generic header compression for ipv6 over low-power wireless personal area networks (6lowpans). Tech. rep.
33.
Zurück zum Zitat Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., et al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Computer aided verification (pp. 281–285). Berlin: Springer.CrossRef Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., et al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Computer aided verification (pp. 281–285). Berlin: Springer.CrossRef
34.
Zurück zum Zitat Von Oheimb, D. (2005). The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of APPSEM 2005 workshop (pp. 1–17). Von Oheimb, D. (2005). The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of APPSEM 2005 workshop (pp. 1–17).
35.
Zurück zum Zitat Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.MathSciNetCrossRef Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.MathSciNetCrossRef
36.
Zurück zum Zitat Basin, D., Mödersheim, S., & Vigano, L. (2005). Ofmc: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181–208.CrossRef Basin, D., Mödersheim, S., & Vigano, L. (2005). Ofmc: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181–208.CrossRef
37.
Zurück zum Zitat Turuani, M. (2006). The cl-atse protocol analyser. In International conference on rewriting techniques and applications (pp. 277–286). Berlin: Springer. Turuani, M. (2006). The cl-atse protocol analyser. In International conference on rewriting techniques and applications (pp. 277–286). Berlin: Springer.
38.
Zurück zum Zitat Armando, A., & Compagna, L. (2004). Satmc: a sat-based model checker for security protocols. In European workshop on logics in artificial intelligence (pp. 730–733). Berlin: Springer. Armando, A., & Compagna, L. (2004). Satmc: a sat-based model checker for security protocols. In European workshop on logics in artificial intelligence (pp. 730–733). Berlin: Springer.
39.
Zurück zum Zitat Viganò, L. (2006). Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science, 155, 61–86.CrossRef Viganò, L. (2006). Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science, 155, 61–86.CrossRef
41.
Zurück zum Zitat Porambage, P., Braeken, A., Kumar, P., Gurtov, A., & Ylianttila, M. (2015). Efficient key establishment for constrained iot devices with collaborative hip-based approach. In 2015 IEEE global communications conference (GLOBECOM) (pp. 1–6). IEEE. Porambage, P., Braeken, A., Kumar, P., Gurtov, A., & Ylianttila, M. (2015). Efficient key establishment for constrained iot devices with collaborative hip-based approach. In 2015 IEEE global communications conference (GLOBECOM) (pp. 1–6). IEEE.
43.
Zurück zum Zitat Capossele, A., Cervo, V., De Cicco, G., & Petrioli, C. (2015). Security as a coap resource: An optimized dtls implementation for the iot. In 2015 IEEE international conference on communications (ICC) (pp. 549–554). IEEE. Capossele, A., Cervo, V., De Cicco, G., & Petrioli, C. (2015). Security as a coap resource: An optimized dtls implementation for the iot. In 2015 IEEE international conference on communications (ICC) (pp. 549–554). IEEE.
47.
Metadaten
Titel
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks
verfasst von
Jiyong Han
Daeyoung Kim
Publikationsdatum
18.05.2020
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02330-2

Weitere Artikel der Ausgabe 6/2020

Wireless Networks 6/2020 Zur Ausgabe

Neuer Inhalt