Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks

In the past few years, Internet Engineering Task Force (IETF) has standardized "lightweight" IPv4/IPv6 protocol variations for Wireless Sensor Network (WSN) on resource constrained devices. In the above approaches, security is considered a strong requirement, however, adapting IP oriented security protocols (like the IETF Data-gram Transport Layer Protocol DTLS) to actual WSN security enabled implementations requires tradeoffs between performance, energy consumption and security level. In this paper, the above tradeoffs are explored for the latest version of the widely accepted Contiki OS (version 3.x) when DTLS security is enabled for the IETF supported Constrained Application Protocol (CoAP). More specifically, the DTLS framework is integrated in the Contiki 3 CoAP stack for 2 different cipher suites and the performance in comparison with non secure CoAP applications is evaluated through simulation, in terms of speed, memory overhead and energy consumption for various WSN clientserver network environment. Finally, tradeoff and recommendation for balanced performance versus security are proposed.

[1]  Alan DeKok Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS , 2014, RFC.

[2]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[3]  Soma Bandyopadhyay,et al.  LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[4]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[5]  Andrzej Duda,et al.  DTLS performance in duty-cycled networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[6]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[7]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[8]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[9]  Chiara Petrioli,et al.  Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).

[10]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.