Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors

[Display omitted] •There is a lack of end-to-end security mechanisms tailored to IP-enabled sensors.•Ladon is proposed as end-to-end authentication and authorization protocol.•We evaluate the time and energy cost of executing Ladon on the protected sensors.•Ladon is proved to be a suitable security...

Full description

Saved in:
Bibliographic Details
Published inComputers & electrical engineering Vol. 40; no. 2; pp. 539 - 550
Main Authors Astorga, Jasone, Jacob, Eduardo, Toledo, Nerea, Aguado, Marina
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.02.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:[Display omitted] •There is a lack of end-to-end security mechanisms tailored to IP-enabled sensors.•Ladon is proposed as end-to-end authentication and authorization protocol.•We evaluate the time and energy cost of executing Ladon on the protected sensors.•Ladon is proved to be a suitable security protocol for resource-deprived devices. With the development of the 6LoWPAN standard, sensors can be natively integrated into the IP world, becoming tiny information providers that are directly addressable by any Internet-connected party. To protect the information gathered by sensors from any potential attacker on the Internet, it is essential to have trustworthy real-time information about the legitimacy of every attempt to interact with a sensor. Our approach to address this issue is Ladon, a new security protocol specifically tailored to the characteristics of low capacity devices. In this paper, we study the performance of Ladon, showing that it successfully meets the requirements of the targeted environments. To that end, we evaluate the delay and energy consumption of the execution of Ladon. The obtained results show that the cost of Ladon is bounded, even in situations of high packet loss rates (20–80%) and comparable to that of other protocols that implement fewer security features.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0045-7906
1879-0755
DOI:10.1016/j.compeleceng.2013.10.002