scispace - formally typeset
Open AccessJournal ArticleDOI

Performance of the Transport Layer Security Handshake Over 6TiSCH.

TLDR
In this article, a thorough comparison of the Transport Layer Security (TLS) v1.2 and Datagram TLS (DTLS) protocol in 6TiSCH networks is presented.
Abstract
This paper presents a thorough comparison of the Transport Layer Security (TLS) v1.2 and Datagram TLS (DTLS) v1.2 handshake in 6TiSCH networks. TLS and DTLS play a crucial role in protecting daily Internet traffic, while 6TiSCH is a major low-power link layer technology for the IoT. In recent years, DTLS has been the de-facto security protocol to protect IoT application traffic, mainly because it runs over lightweight, unreliable transport protocols, i.e., UDP. However, unlike the DTLS record layer, the handshake requires reliable message delivery. It, therefore, incorporates sequence numbers, a retransmission timer, and a fragmentation algorithm. Our goal is to study how well these mechanisms perform, in the constrained setting of 6TiSCH, compared to TCP’s reliability algorithms, relied upon by TLS. We port the mbedTLS library to OpenWSN, a 6TiSCH reference implementation, and deploy the code on the state-of-the-art OpenMote platform. We show that, when the peers use an ideal channel, the DTLS handshake uses up to 800 less and completes 0.6 s faster. Nonetheless, using an unreliable communication link, the DTLS handshake duration suffers a performance penalty of roughly 45%, while TLS’ handshake duration degrades by merely 15%. Similarly, the number of exchanged bytes doubles for DTLS while for TLS the increase is limited to 15%. The results indicate that IoT product developers should account for network characteristics when selecting a security protocol. Neglecting to do so can negatively impact the battery lifetime of the entire constrained network.

read more

Citations
More filters
Journal ArticleDOI

Intelligent edge computing enabled reliable emergency data transmission and energy efficient offloading in 6TiSCH-based IIoT networks

TL;DR: In this article , an Edge-assisted 6TiSCH network for IIoT is proposed to overcome the above challenges such as Low latency and more energy consumption by efficient task scheduling and edge offloading considering risk in IIOT environment.
Book ChapterDOI

Cyber Security for IoT-Enabled Industry 4.0

TL;DR: In this paper , a comprehensive view of the various threats and attacks targeting the infrastructure of the IoT and to analyze the various cyber defense techniques and solutions that are being used to secure the connected objects.
References
More filters

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).

The Transport Layer Security (TLS) Protocol Version 1.2

Eric Rescorla
TL;DR: This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

Requirements for Internet Hosts - Communication Layers

Robert Braden
TL;DR: This RFC is an official specification for the Internet community that incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.
Proceedings ArticleDOI

X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks

TL;DR: X-MAC as mentioned in this paper employs a shortened preamble approach that retains the advantages of low power listening, namely low power communication, simplicity and a decoupling of transmitter and receiver sleep schedules.

TCP Selective Acknowledgement Options

TL;DR: TCP may experience poor performance when multiple packets are lost from one window of data because of the limited information available from cumulative acknowledgments.
Related Papers (5)