14 research outputs found

    Evaluating IP security and mobility on lightweight hardware

    Get PDF
    This work presents an empirical evaluation of applicability of selected existing IP security and mobility mechanisms to lightweight mobile devices and network components with limited resources and capabilities. In particular, we consider the Host Identity Protocol (HIP), recently specified by the IETF for achieving authentication, secure mobility and multihoming, data protection and prevention of several types of attacks. HIP uses the Diffie-Hellman protocol to establish a shared secret for two hosts, digital signatures to provide integrity of control plane and IPsec ESP encryption to protect user data. These computationally expensive operations might easily stress CPU, memory and battery resources of a lightweight client, as well as negatively affect data throughput and latency.We describe our porting experience with HIP on an embedded Linux PDA, a Symbian-based smartphone and two OpenWrt Wi-Fi access routers, thereby contributing to the protocol deployment. We present a set of measurement results of different HIP operations on these devices and evaluate the impact of public-key cryptography on the processor load, memory usage and battery lifetime, as well as the influence of the IPsec encryption on Round-Trip Time and TCP throughput. In addition, we assess how the lightweight hardware of a mobile handheld or a Wi-Fi access router in turn affects the duration of certain protocol operations including HIP base exchange, HIP mobility update, puzzle solving procedure and generation of an asymmetric key pair. After analyzing the empirical results we make conclusions and recommendations on applicability of unmodified HIP and IPsec to resource-constrained mobile devices. We also survey related work and draw parallels with our own research results

    Evaluating IP security on lightweight hardware

    Get PDF
    TCP/IP communications stack is being increasingly used to interconnect mobile phones, PDAs, sensor motes and other wireless embedded devices. Although the core functionality of communications protocols has been successfully adopted to lightweight hardware from the traditional Internet and desktop computers, suitability of strong security mechanisms on such devices remains questionable. Insufficient processor, memory and battery resources, as well as constraints of wireless communications limit the applicability of many existing security protocols that involve computationally intensive operations. Varying capabilities of devices and application scenarios with different security and operational requirements complicate the situation further and call for agile and flexible security systems. This study does an empirical evaluation of applicability of selected existing IP security mechanisms to lightweight (resource-constrained) devices. In particular, we evaluate various components of the Host Identity Protocol (HIP), standardized by the Internet Engineering Task Force for achieving authentication, shared key negotiation, secure mobility and multihoming and, if used with IPsec, integrity and confidentiality of user data. Involving a set of cryptographic operations, HIP might easily stress a lightweight client, while affecting performance of applications running on it and shortening battery lifetime of the device. We present a background and related work on network-layer security, as well as a set of measurement results of various security components obtained on devices representing lightweight hardware: embedded Linux PDAs, Symbian-based smartphones, OpenWrt Wi-Fi access routers and wireless sensor platforms. To improve computational and energy efficiency of HIP, we evaluate several lightweight mechanisms that can substitute standard protocol components and provide a good trade-off between security and performance in particular application scenarios. We describe cases where existing HIP security mechanisms (i) can be used unmodified and (ii) should be tailored or replaced to suit resource-constrained environments. The combination of presented security components and empirical results on their applicability can serve as a reference framework for building adaptable and flexible security services for future lightweight communication systems

    Internet of Things for enabling smart environments: a technology-centric perspective

    Get PDF
    The Internet of Things (IoT) is a computing paradigm whereby everyday life objects are augmented with computational and wireless communication capabilities, typically through the incorporation of resource-constrained devices including sensors and actuators, which enable their connection to the Internet. The IoT is seen as the key ingredient for the development of smart environments. Nevertheless, the current IoT ecosystem offers many alternative communication solutions with diverse performance characteristics. This situation presents a major challenge to identifying the most suitable IoT communication solution(s) for a particular smart environment. In this paper we consider the distinct requirements of key smart environments, namely the smart home, smart health, smart cities and smart factories, and relate them to current IoT communication solutions. Specifically, we describe the core characteristics of these smart environments and then proceed to provide a comprehensive survey of relevant IoT communication technologies and architectures. We conclude with our reflections on the crucial features of IoT solutions in this setting and a discussion of challenges that remain open for research

    Infraestrutura de beira de estrada para apoio a sistemas cooperativos e inteligentes de transportes

    Get PDF
    The growing need of mobility along with the evolution of the automotive industry and the massification of the personal vehicle amplifies some of the road-related problems such as safety and traffic congestion. To mitigate such issues, the evolution towards cooperative communicating technologies and autonomous systems is considered a solution to overcome the human physical limitations and the limited perception horizon of on-board sensors. Short-range vehicular communications such as Vehicle-to-Vehicle or Vehicle-to-Infrastructure (ETSI ITS-G5) in conjunction with long-range cellular communications (LTE,5G) and standardized messages, emerge as viable solutions to amplify the benefits that standalone technologies can bring to the road environment, by covering a wide array of applications and use cases. In compliance with the standardization work from European Telecommunications Standards Institute (ETSI), this dissertation describes the implementation of the collective perception service in a real road infrastructure to assist the maneuvers of autonomous vehicles and provide information to a central road operator. This work is focused on building standardized collective perception messages (CPM) by retrieving information from traffic classification radars (installed in the PASMO project) for local dissemination using ETSI ITS-G5 radio technology and creating a redundant communication channel between the road infrastructure and a central traffic control centre, located at the Instituto de Telecomunicações - Aveiro, taking advantage of cellular, point-to-point radio links and optical fiber communications. The output of the messages are shown to the user by a mobile application. The service is further improved by building an algorithm for optimizing the message dissemination to improve channel efficiency in more demanding scenarios. The results of the experimental tests showed that the time delay between the production event of the collective perception message and the reception by other ITS stations is within the boundaries defined by ETSI standards. Moreover, the algorithm for message dissemination also shows to increase radio channel efficiency by limiting the number of objects disseminated by CPM messages. The collective perception service developed and the road infrastructure are therefore, a valuable asset to provide useful information for improving road safety and fostering the deployment of intelligent cooperative transportation systems.A crescente necessidade de mobilidade em paralelo com a evolução da indústria automóvel e com a massificação do uso de meios de transportes pessoais, têm vindo a amplificar alguns problemas dos transportes rodoviários, tais como a segurança e o congestionamento do tráfego. Para mitigar estas questões, a evolução das tecnologias de comunicação cooperativas e dos sistemas autónomos é vista como uma potencial solução para ultrapassar limitações dos condutores e do horizonte de perceção dos sensores veículares. Comunicações de curto alcance, tais como Veículo-a-Veículo ou Veículo-a-Infrastrutura (ETSI ITS-G5), em conjunto com comunicações móveis de longo alcance (LTE,5G) e mensagens padrão, emergem como soluções viáveis para amplificar todos os beneficios que tecnologias independentes podem trazer para o ambiente rodoviário, cobrindo um grande leque de aplicações e casos de uso da estrada. Em conformidade com o trabalho de padronização da European Telecommunications Standards Institute, esta dissertação descreve a implementação do serviço de perceção coletiva, numa infrastrutura rodoviária real, para suporte a manobras de veículos autónomos e para fornecer informações aos operadores de estradas. Este trabalho foca-se na construção de mensagens de perceção coletiva a partir de informação gerada por radares de classificação de tráfego (instalados no âmbito do projeto PASMO) para disseminação local usando a tecnologia rádio ETSI ITS-G5 e criando um canal de comunicação redundante entre a infraestrutura rodóviaria e um centro de controlo de tráfego localizado no Instituto de Telecomunicações - Aveiro, usando para isso: redes móveis, ligações rádio ponto a ponto e fibra ótica. O conteúdo destas messagens é mostrado ao utilizador através de uma aplicação móvel. O serviço é ainda melhorado, tendo-se para tal desenvolvido um algoritmo de otimização de disseminação das mensagens, tendo em vista melhorar a eficiência do canal de transmissão em cenários mais exigentes. Os resultados dos testes experimentais efetuados revelaram que o tempo de atraso entre o evento de produção de uma mensagem de perceção coletiva e a receção por outra estação ITS, usando comunicações ITS-G5, se encontra dentro dos limites definidos pelos padrões da ETSI. Além disso, o algoritmo para disseminação de mensagens também mostrou aumentar a eficiência do canal de rádio, limitando o número de objetos disseminados pelas mesmas. Assim, o serviço de perceção coletiva desenvolvido poderá ser uma ferramenta valiosa, contribuindo para o aumento da segurança rodóviaria e para a disseminação da utilização dos sistemas cooperativos de transporte inteligente.Mestrado em Engenharia Eletrónica e Telecomunicaçõe

    A session-based architecture for Internet mobility

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2003.Includes bibliographical references (p. 179-189).The proliferation of mobile computing devices and wireless networking products over the past decade has led to an increasingly nomadic computing lifestyle. A computer is no longer an immobile, gargantuan machine that remains in one place for the lifetime of its operation. Today's personal computing devices are portable, and Internet access is becoming ubiquitous. A well-traveled laptop user might use half a dozen different networks throughout the course of a day: a cable modem from home, wide-area wireless on the commute, wired Ethernet at the office, a Bluetooth network in the car, and a wireless, local-area network at the airport or the neighborhood coffee shop. Mobile hosts are prone to frequent, unexpected disconnections that vary greatly in duration. Despite the prevalence of these multi-homed mobile devices, today's operating systems on both mobile hosts and fixed Internet servers lack fine-grained support for network applications on intermittently connected hosts. We argue that network communication is well-modeled by a session abstraction, and present Migrate, an architecture based on system support for a flexible session primitive. Migrate works with application-selected naming services to enable seamless, mobile "suspend/resume" operation of legacy applications and provide enhanced functionality for mobile-aware, session-based network applications, enabling adaptive operation of mobile clients and allowing Internet servers to support large numbers of intermittently connected sessions. We describe our UNIX-based implementation of Migrate and show that sessions are a flexible, robust, and efficient way to manage mobile end points, even for legacy applications.(cont.) In addition, we demonstrate two popular Internet servers that have been extended to leverage our novel notion of session continuations to enable support for large numbers of suspended clients with only minimal resource impact. Experimental results show that Migrate introduces only minor throughput degradation (less than 2% for moderate block sizes) when used over popular access link technologies, gracefully detects and suspends disconnected sessions, rapidly resumes from suspension, and integrates well with existing applications.by Mark Alexander Connell Snoeren.Ph.D

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Measuring the IPv4-IPV6 IVI Translation Overhead

    No full text
    ABSTRACT While IPv6 deployment in the Internet continues to grow slowly at present, the imminent exhaustion of IPv4 addresses will encourage its increased use over the next several years. However, due to the predominance of IPv4 in the Internet, the transition to IPv6 is likely to take a long time. During the transition period, translation mechanisms will enable IPv6 hosts and IPv4 hosts to communicate with each other. For example, translation can be used when a server or application works with IPv4 but not with IPv6, and the effort or cost to modify the code is large. Stateless and stateful translation is the subject of several recent IETF RFCs. We measure the overhead due to the new IVI translator, which is viewed as a design for stateless translation, by measuring the internal timing for a freely available Linux implementation of IVI. To study the impact of operating system overhead on IVI translation, we also implement the IVI translator on a bare PC that runs applications without an operating system or kernel. Our results show that translating IPv4 packets into IPv6 packets is more expensive than the reverse, and that address mapping is the most expensive IVI operation. While both implementations of IVI have low overhead, a modest performance gain is obtained due to using a bare PC
    corecore