Link-layer security in TSCH networks: effect on slot duration

The IEEE802.15.4e-2012 standard is widely used in multi-hop wireless Industrial Internet of Things (IIoT) applications. In the Time-Slotted Channel Hopping (TSCH) mode, nodes are synchronized, and time is cut into timeslots. A schedule orchestrates all communications, resulting in high reliability and low power operations. A timeslot must be long enough for a node to send a data frame to its neighbor, and for that neighbor to send back an acknowledgment. Shorter timeslots enable higher bandwidth and lower latency, yet the minimal timeslot duration is limited by how long link-layer security operations take. We evaluate the overhead of link-layer security in TSCH networks in terms of minimal timeslot length, memory footprint, and energy consumption. We implement full link-layer security on a range of hardware platforms, exploring di erent hardware/software implementation strategies. Through an extensive measurement campaign, we quantify the advantage of hardware accelerations for link-layer security, and show how the minimal duration of a timeslot varies between 9 ms and 88 ms for the most common con guration, depending on hardware support. Furthermore, we also highlighted the impact that the timeslot duration has on both high-level application design and energy consumption.

[1]  Gennaro Boggia,et al.  On Optimal Scheduling in Duty-Cycled Industrial IoT Applications Using IEEE802.15.4e TSCH , 2013, IEEE Sensors Journal.

[2]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[3]  Russ Housley,et al.  Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) , 2004, RFC.

[4]  Andrzej Duda,et al.  OSCAR: Object security architecture for the Internet of Things , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[5]  Panu Hämäläinen,et al.  Efficient hardware implementation of security processing for IEEE 802.15.4 wireless networks , 2005 .

[6]  David A. McGrew,et al.  AES-CCM Cipher Suites for Transport Layer Security (TLS) , 2012, RFC.

[7]  Feng Cheng,et al.  Performance impact of and protocol interdependencies of IEEE 802.15.4 security mechanisms , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[8]  Gourab Sen Gupta,et al.  Smart Sensors and Sensing Technology , 2008 .

[9]  Yan Zhang,et al.  Superframe Planning and Access Latency of Slotted MAC for Industrial WSN in IoT Environment , 2014, IEEE Transactions on Industrial Informatics.

[10]  Thomas Watteyne,et al.  Adaptive Synchronization in IEEE802.15.4e Networks , 2014, IEEE Transactions on Industrial Informatics.

[11]  Nicola Bui,et al.  Low power link layer security for IoT: Implementation and performance analysis , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[12]  Jonathan Tse,et al.  AES Hardware-Software Co-design in WSN , 2015, 2015 21st IEEE International Symposium on Asynchronous Circuits and Systems.

[13]  Kristofer S. J. Pister,et al.  TSMP: TIME SYNCHRONIZED MESH PROTOCOL , 2008 .

[14]  David A. McGrew,et al.  AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS , 2014, RFC.

[15]  Utz Roedig,et al.  Demo abstract: Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[16]  Gianluca Dini,et al.  On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[17]  Yu Han,et al.  An Energy-Efficient AES-CCM Implementation for IEEE802.15.4 Wireless Sensor Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[18]  Andrzej Duda,et al.  Energy cost of security in an energy-harvested IEEE 802.15.4 Wireless Sensor Network , 2014, 2014 3rd Mediterranean Conference on Embedded Computing (MECO).

[19]  Thomas Watteyne,et al.  OpenMote: Open-Source Prototyping Platform for the Industrial IoT , 2015, ADHOCNETS.

[20]  Charalampos Manifavas,et al.  IPsec over IEEE 802.15.4 for low power and lossy networks , 2013, MobiWac '13.

[21]  Utz Roedig,et al.  Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.

[22]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[23]  Thomas Watteyne,et al.  Technical Overview of SmartMesh IP , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[24]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[25]  Diego Dujovne,et al.  6TiSCH: deterministic IP-enabled industrial internet (of things) , 2014, IEEE Communications Magazine.

[26]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[27]  Kevin Weekly,et al.  OpenWSN: a standards‐based low‐power wireless development environment , 2012, Trans. Emerg. Telecommun. Technol..

[28]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[29]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[30]  Elfed Lewis,et al.  Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .

[31]  Kostas Berberidis,et al.  Low Complexity Turbo Equalization for High Data Rate Wireless Communications , 2006, EURASIP J. Wirel. Commun. Netw..