مشخصات مقاله | |
ترجمه عنوان مقاله | 6LowPSec: یک پروتکل امنیتی پایان به پایان برای 6LoWPAN |
عنوان انگلیسی مقاله | 6LowPSec: An end-to-end security protocol for 6LoWPAN |
انتشار | مقاله سال 2019 |
تعداد صفحات مقاله انگلیسی | 15 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله | مقاله پژوهشی (Research article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | scopus – master journals – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) | 3.151 در سال 2017 |
شاخص H_index | 73 در سال 2018 |
شاخص SJR | 0.53 در سال 2018 |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، اینترنت و شبکه های گسترده، شبکه های کامپیوتری |
نوع ارائه مقاله | ژورنال |
مجله / کنفرانس | شبکه های ادهاک – Ad Hoc Networks |
دانشگاه | National Engineering School of Tunis – University of Tunis-El Manar – Tunisia |
کلمات کلیدی | اینترنت اشیا، 6LoWPAN، امنیت پایان به پایان، IPSec، IEEE 802.15.4، پروتکل های مسیریابی |
کلمات کلیدی انگلیسی | Internet of Things, 6LoWPAN, End-To-End Security, IPSec, IEEE 802.15.4, Routing Protocols |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.adhoc.2018.01.013 |
کد محصول | E9732 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract Keywords 1 Introduction 2 State of the art 3 6LowPSec protocol 4 Performance evaluation 5 Security analysis 6 Conclusion Appendix A. Supplementary materials References Vitae |
بخشی از متن مقاله: |
Abstract
6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication over IEEE 802.15.4 LoWPAN radio links requires high end-to-end security rules. The IEEE 802.15.4 MAC layer implements several security features offering hardware hop-by-hop protection for exchanged frames. In order to provide end-to-end security, researchers focus on lightweighting variants of existing security solutions such as IPSec that operates on the network layer. In this paper, we introduce a new security protocol referred to as ”6LowPSec”, providing a propitious end-to-end security solution but functioning at the adaptation layer. 6LowPSec employs existing hardware security features specified by the MAC security sublayer. A detailed campaign is presented that evaluates the performances of 6LowPSec compared with the lightweight IPSec. Results prove the feasibility of an end-to-end hardware security solution for IoT, that operates at the adaptation layer, without incurring much overhead. Introduction The mash-up of captured data with retrieved Internet data gives rise to new synergistic services that surpass the services supported by isolated embedded systems. This new vision in5 troduced by the Internet of Things (IoT) allows IP communication and interaction between objects possessing computing and sensorial capabilities [1]. This lead to the definition of Low Power and Lossy Networks (LLN) composed of a large number of constrained devices characterized by limited power and 10 memory processing, high loss rates, and short-range wireless communications [2][3]. With respect to all these constraints, defining appropriate protocol stacks covering all aspects, from application to radio layer, has became a major concern of researchers and in15 dustrials. To address this need, the Internet Engineering Task Force (IETF) created the 6LoWPAN Working Group (IPv6 in Low-Power Wireless Personal Area Networks) [4]to standardize necessary adaptations of IPv6 for networks that use the IEEE 802.15.4 physical and MAC layers [5]. 20 Provision of an end-to-end security connection is key to ensure fundamental functionalities. In fact, 6LoWPAN takes advantage of the strong AES-128 link-layer security mechanisms provided by IEEE 802.15.4 [5], but this robust hardware solution is restricted to hop by hop security, i.e., end-to-end security 25 is managed by upper layers. End-to-End (E2E) security solutions protect communications between IP enabled sensors and the traditional Internet.The 6LoWPAN Border Router (6LBR) [6] has the responsibility to interconnect the traditional Internet with the LLN and to allow access to 6LoWPAN devices. 30 Thus, the 6LBR is the best part where one should implement E2E security features. While IPSec [7] and Transport Layer Security (TLS) [8] are mature and proven technologies in the world of the Internet, their adaptation to the LoWPAN world is still a challenge. 35 These protocols require considerable amounts of resources and substantial overhead. A protocol that compresses IPSec headers only in transport mode is provided in [9][10][11]. This protocol implements the route-over routing scheme. However, despite the compression, 40 this protocol remains unsuitable for constrained devices due to its overhead and heavy key establishment process i.e., the Internet Key Exchange protocol (IKEv2) [12]. On the other hand, the use of DTLS (Datagram TransportLayer Security) to secure the CoAP (Constrained Application 45 Protocol) application layer raises many questions about its implementation and its usability in the real world is still unproven [13][14]. The new design of DTLS for IoT requires the use of a header compression scheme, which could compromise end-toend security properties provided by the original DTLS protocol. 50 Further, its handshake (for authentication and key agreement scheme, using ECC (Elliptic Curve Cryptography), is unsuitable for constrained devices due to the fragmentation of large messages performed at the adaptation. This implies retransmission and reordering of DTLS handshake messages. In addition, 55 this solution does not support multicast communications, which is a major requirement in IoT environments. |