DTLS Performance - How Expensive is Security?

04/25/2019
by   Sebastian Gallenmüller, et al.
0

Secure communication is an integral feature of many Internet services. The widely deployed TLS protects reliable transport protocols. DTLS extends TLS security services to protocols relying on plain UDP packet transport, such as VoIP or IoT applications. In this paper, we construct a model to determine the performance of generic DTLS-enabled applications. Our model considers basic network characteristics, e.g., number of connections, and the chosen security parameters, e.g., the encryption algorithm in use. Measurements are presented demonstrating the applicability of our model. These experiments are performed using a high-performance DTLS-enabled VPN gateway built on top of the well-established libraries DPDK and OpenSSL. This VPN solution represents the most essential parts of DTLS, creating a DTLS performance baseline. Using this baseline the model can be extended to predict even more complex DTLS protocols besides the measured VPN. Code and measured data used in this paper are publicly available at https://git.io/MoonSec and https://git.io/Sdata.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/29/2023

Performance Evaluation of Transport Protocols and Roadmap to a High-Performance Transport Design for Immersive Applications

Immersive technologies such as virtual reality (VR), augmented reality (...
research
04/06/2023

Routing over QUIC: Bringing transport innovations to routing protocols

By combining the security features of TLS with the reliability of TCP, Q...
research
07/31/2022

Secure Email Transmission Protocols – A New Architecture Design

During today's digital age, emails have become a crucial part of communi...
research
10/17/2018

Implementation and Analysis of QUIC for MQTT

Transport and secure layer protocols are essential to ensure reliable an...
research
09/12/2023

MCQUIC: Multicast and unicast in a single transport protocol

Multicast enables efficient one-to-many communications. Several applicat...
research
07/23/2020

Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool

Tor is the most well-known tool for circumventing censorship. Unfortunat...

Please sign up or login with your details

Forgot password? Click here to reset