DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead
Billions of devices are being connected to the Internet creating the Internet of Things (IoT). The IoT not only requires strong security, like current Internet applications, but also efficient operation. The recently introduced HIMMO scheme enables lightw
- PDF / 444,303 Bytes
- 19 Pages / 439.37 x 666.142 pts Page_size
- 65 Downloads / 189 Views
Abstract. Billions of devices are being connected to the Internet creating the Internet of Things (IoT). The IoT not only requires strong security, like current Internet applications, but also efficient operation. The recently introduced HIMMO scheme enables lightweight and collusionresistant identity-based key sharing in a non-interactive way, so that any pair of Internet-connected devices can securely communicate. This paper firstly reviews the HIMMO scheme and introduces two extensions that e.g. enable implicit credential verification without the need of traditional digital certificates. Then, we show how HIMMO can be efficiently implemented even in resource-constrained devices, enabling combined key agreement and credential verification more efficiently than using ECDH-ECDSA. We further explain how HIMMO helps to secure the Internet and IoT by introducing the DTLS-HIMMO operation mode. DTLS, the datagram version of TLS, is becoming the standard security protocol in the IoT, although it is very frequently discussed that it does not offer the right performance for IoT scenarios. Our design, implementation, and evaluation show that DTLS-HIMMO operation mode achieves the security properties of the DTLS-Certificate security suite while exhibiting the overhead of symmetric-key primitives without requiring changes in the DTLS standard. Keywords: HIMMO infrastructure.
1
·
Lightweight
·
(D)TLS
·
Quantum
·
TTP
Introduction
The Internet of Things (IoT) is connecting billions of smart devices deployed in critical applications like healthcare, distributed control systems, smart cities and smart energy. The IoT not only needs strong security solutions, like today’s Internet, but also efficient approaches to secure the data exchanges between smart devices, and between smart devices and the Internet. The Transport Layer Security (TLS) [5] and its Datagram version (DTLS) are two of the most important protocols used to secure the Internet. DTLS is becoming the security standard to secure the IoT since it is required by many Machine to Machine standards such as LWM2M. However, it is very frequently c Springer International Publishing Switzerland 2015 G. Pernul et al. (Eds.): ESORICS 2015, Part I, LNCS 9326, pp. 224–242, 2015. DOI: 10.1007/978-3-319-24174-6 12
DTLS-HIMMO: Achieving DTLS Certificate Security
225
discussed that DTLS and its cipher suites are too heavy for many IoT use cases. In some cases, resource limitations (e.g., memory or energy) of end devices may prohibit the support of the standard algorithms. In other cases, the large number of devices and lack of user interface make the managing of large amounts of credentials for all those devices extremely complex. In some situations, devices are managed over a cellular connection and each extra byte of consumed bandwidth incurs costs. It is estimated that currently 70 % of the IoT devices have security risks and are often poorly managed [1]. At the same time, the advent of quantum computers will endanger all key agreement primitives used in (D)TLS except pre-shared ke
Data Loading...