Securing communication in 6LoWPAN with compressed IPsec
read more
Citations
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
IoT security: Review, blockchain solutions, and open challenges
The Internet of Things vision: Key features, applications and open issues
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
A Survey on Security and Privacy Issues in Internet-of-Things
References
Security Architecture for the Internet Protocol
Contiki - a lightweight and flexible operating system for tiny networked sensors
Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors
Telos: enabling ultra-low power wireless research
Internet Protocol, Version 6 (IPv6) Specification
Related Papers (5)
Frequently Asked Questions (17)
Q2. What contributions have the authors mentioned in the paper "Securing communication in 6lowpan with compressed ipsec" ?
In this paper the authors provide End-to-End ( E2E ) secure communication between IP enabled sensor networks and the traditional Internet.
Q3. How many bytes is the overhead of an ESP?
If additional authentication using AES-XCBC-MAC-96 is used the ESP overhead is 30 bytes, as the minimum length of AESXCBC-MAC-96 is 12 bytes.
Q4. What is the encoding for the IPv6 Extension Headers?
NHC encodings for the IPv6 Extension Headers consist of a NHC octet where three bits (bits 4,5,6) are used to encode the IPv6 Extension Header ID (EID).
Q5. What is the NHC encoding for ESP?
Also the NHC encoding for ESP encodes the security parameter index, the sequence number, the next header fields and the NHC ID for ESP.
Q6. What is the encoding for the next header?
6LoWPAN specifies that the size of NHC should be multiple of octets, usually 1 byte where first variable lengthbits represents a NHC ID and the remaining bits are used to encode/compress headers.
Q7. How many bytes are required for a perfect block alignment?
If the authors assume mandatory AES-CBC as encryption algorithm an ESP with perfect block alignment will have an overhead of 18 bytes (10 bytes for ESP and 8 bytes for Initialization Vector).
Q8. What is the proposed standard for Cryptographic Suites for IPsec?
The proposed standard for Cryptographic Suites for IPsec specifies that the future IPsec systems will use AES-CBC-128 for encryption and AES-XCBC-MAC-96 mode for authentication [27].
Q9. What is the average decrease for ESP?
For ESP the decrease ranges from 64 % to 37 %.WSNs will be an integral part of the Internet and IPv6 and 6LoWPAN are the protocol standards that are expected to be used in this context.
Q10. How many bytes is the overhead of a ESP?
ESP with authentication (HMAC-SHA1-96) has an overhead of 30 bytes which is reduced to 24 bytes using the outlined ESP compression.
Q11. What is the overhead of a header in IPsec?
This means that as soon as two or more fragments are needed, IPsec offers a lower header overhead than 802.15.4 link-layer security.
Q12. What is the way to enable UDP compression with ESP?
To enable UDP compression with ESP the authors need to specify a new encryption algorithm for ESP which is able to perform UDP header compression and encryption.
Q13. How can the authors secure communication between sensor nodes and hosts?
The authors have extensively evaluated their implementation and demonstrated that it is possible and feasible to use compressed IPsec to secure communication between sensor nodes and hosts in the Internet.
Q14. How much overhead does the ability to provide E2E authentication with IPsec have?
The ability to provide E2E authentication with IPsec has hence a cost of 4 bytes compared to the 802.15.4 baseline which provides only hop-by-hop security.
Q15. What is the default SPI for the AH?
If 1, the length is carried inline after the NHC AH header ∙ SPI: If 0, the default SPI for the sensor network is used and the SPI field is omitted.
Q16. How much overhead does the ability to provide E2E encryption and authentication with IPsec have?
The ability to provide E2E encryption and authentication with IPsec has hence a cost of 3 bytes compared to the 802.15.4 baseline.
Q17. What is the impact of IPsec on the network?
After describing their implementation and experimental setup, the authors evaluate the impact of IPsec in terms of memory footprint, packet size, energy consumption and performances under different configurations.