μDTNSec: a security layer with lightweight certificates for Disruption-Tolerant Networks on microcontrollers

被引:0
|
作者
Schuermann, Dominik [1 ]
von Zengen, Georg [1 ]
Priedigkeit, Marvin [1 ]
Willenborg, Sebastian [1 ]
Wolf, Lars [1 ]
机构
[1] TU Braunschweig, Inst Operating Syst & Comp Networks, Braunschweig, Germany
关键词
Disruption-tolerant networking; DTN; Microcontroller; Security; PKI; ELLIPTIC CURVE CRYPTOGRAPHY; SENSOR; OPPORTUNITIES; CONTIKI; LIMITS;
D O I
10.1007/s12243-018-0655-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In Delay/Disruption-Tolerant Networks, man-in-the-middle attacks are easy: due to the store-carry-forward principle, an attacker can simply place itself on the route between source and destination to eavesdrop or alter bundles. This weakness is aggravated in networks, where devices are energy-constrained but the attacker is not. To protect against these attacks, we design and implement mu DTNSec, a security layer for Delay/Disruption-Tolerant Networks on microcontrollers. Our design establishes a public key infrastructure with lightweight certificates as an extension to the Bundle Protocol. It has been fully implemented as an addition to mu DTN on Contiki OS and uses elliptic curve cryptography and hardware-backed symmetric encryption. In this enhanced version of mu DTNSec, public key identity bindings are validated by exchanging certificates using neighbor discovery. mu DTNSec provides a signature mode for authenticity and a sign-then-encrypt mode for added confidentiality. Our performance evaluation shows that the choice of the curve dominates the influence of the payload size. We also provide energy measurements for all operations to show the feasibility of our security layer on energy-constrained devices. Because a high quality source of randomness is required, we evaluated the random number generators by the AT86RF231 radio, its successor AT86RF233, and one based on the noise of the A/D converter. We found that only AT86RF233 provides the required quality.
引用
收藏
页码:589 / 600
页数:12
相关论文
共 50 条
  • [31] A Framework for Extending Contact Opportunities in Delay-and Disruption-Tolerant Networks
    Yasmeen, Farzana
    Huda, Nurul
    Uyen Trang Nguyen
    Yamada, Shigeki
    Borcea, Cristian
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1551 - 1556
  • [33] EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments
    Vakde, Gauri
    Bibikar, Radhika
    Le, Zhengyi
    Wright, Matthew
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1243 - 1256
  • [34] Performance Comparison of Intentional Caching Schemes in Disruption-Tolerant Networks (DTN)
    Manju, S.
    Kumar, S. J. K. Jagadeesh
    Azhaguramyaa, V. R.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 265 - 273
  • [35] MOPS: Providing Content-based Service in Disruption-tolerant Networks
    Li, Feng
    Wu, Jie
    2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2009, : 526 - 533
  • [36] A new approach to design of weather disruption-tolerant wireless mesh networks
    Jacek Rak
    Telecommunication Systems, 2016, 61 : 311 - 323
  • [37] Mitigating Denial of Service Attacks in Delay-and Disruption-Tolerant Networks
    Ansa, Godwin
    Johnson, Enyenihi
    Cruickshank, Haitham
    Sun, Zhili
    PERSONAL SATELLITE SERVICES, 2010, 43 : 221 - 234
  • [38] Task-oriented and Disruption-tolerant Traffic Steering in UAV Networks
    Ge, Taiheng
    Zhang, Chi
    Pan, Miao
    2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [39] Locus: A Location-based Data Overlay for Disruption-tolerant Networks
    Thompson, Nathanael
    Crepaldi, Riccardo
    Kravets, Robin
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '10), 2010, : 47 - 54
  • [40] Weather Disruption-Tolerant Self-Optimising Millimeter Mesh Networks
    Jabbar, Abdul
    Raman, Bharatwajan
    Frost, Victor S.
    Sterbenz, James P. C.
    SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2008, 5343 : 242 - 255