Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2013

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

Panagiotis Ilia
  • Fonction : Auteur
  • PersonId : 1003789
George Oikonomou
  • Fonction : Auteur
  • PersonId : 986209
Theo Tryfonas
  • Fonction : Auteur
  • PersonId : 986210

Résumé

The IEEE 802.15.4 standard for low-power radio communications defines techniques for the encryption of layer 2 network frames but does not discuss methods for the establishment of encryption keys. The constrained nature of wireless sensor devices poses many challenges to the process of key establishment. In this paper, we investigate whether any of the existing key exchange techniques developed for traditional, application-centric wireless sensor networks (WSN) are applicable and viable for IPv6 over Low power Wireless Personal Area Networks (6LoWPANs). We use Elliptic Curve Cryptography (ECC) to implement and apply the Elliptic Curve Diffie Hellman (ECDH) key exchange algorithm and we build a mechanism for generating, storing and managing secret keys. The mechanism has been implemented for the Contiki open source embedded operating system. We use the Cooja simulator to investigate a simple network consisting of two sensor nodes in order to identify the characteristics of the ECDH technique. We also simulate a larger network to examine the solution’s performance and scalability. Based on those results, we draw our conclusions, highlight open issues and suggest further work.

Mots clés

Fichier principal
Vignette du fichier
978-3-642-38530-8_3_Chapter.pdf (1009.22 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-01485932 , version 1 (09-03-2017)

Licence

Paternité

Identifiants

Citer

Panagiotis Ilia, George Oikonomou, Theo Tryfonas. Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.34-49, ⟨10.1007/978-3-642-38530-8_3⟩. ⟨hal-01485932⟩
67 Consultations
346 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More