-
The DAO Induction Attack Against the RPL-based Internet of Things
RPL is the emerging routing standard for low power and lossy networks (L...
read it
-
Implementation and Analysis of QUIC for MQTT
Transport and secure layer protocols are essential to ensure reliable an...
read it
-
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
Denial of Service (DoS) attacks constitute a major security threat to to...
read it
-
Minimal Virtual Machines on IoT Microcontrollers: The Case of Berkeley Packet Filters with rBPF
Virtual machines (VM) are widely used to host and isolate software modul...
read it
-
Design Considerations for Low Power Internet Protocols
The 6lowpan Internet Standard opens sensor networks up to Internet conne...
read it
-
DTLS Performance - How Expensive is Security?
Secure communication is an integral feature of many Internet services. T...
read it
-
A Secure Back-up and Restore for Resource-Constrained IoT based on Nanotechnology
With the emergence of IoT (Internet of things), huge amounts of sensitiv...
read it
Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3
Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in system software, and in hardware. Standard protocols such as Datagram Transport Layer Security (DTLS 1.2) and Transport Layer Security (TLS 1.2) are often recommended to secure communications to/from IoT devices. Recently, the TLS 1.3 standard was released and DTLS 1.3 is in the final stages of standardization. In this paper, we give an overview of version 1.3 of these protocols, and we provide the first experimental comparative performance analysis of different implementations and various configurations of these protocols, on real IoT devices based on low-power microcontrollers. We show how different implementations lead to different compromises. We measure and compare bytes-over-the-air, memory footprint, and energy consumption. We show that, when DTLS/TLS 1.3 requires more resources than DTLS/TLS 1.2, this additional overhead is quite reasonable. We also observe that, in some configurations, DTLS/TLS 1.3 actually decreases overhead and resource consumption. All in all, our study indicates that there is still room to optimize the existing implementations of these protocols.
READ FULL TEXT
Comments
There are no comments yet.