Towards supporting IoT device storage and network security using DTLs

Eun Seong Boo, Shahid Raza, Joel Höglund, Jeong Gil Ko

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This work presents FDTLS, a security framework that combines storage and network/communication-level security for resource limited Internet of Things (IoT) devices using Datagram Transport Layer Security (DTLS). While coalescing storage and networking security scheme can reduce redundent and unnecessary operations, we identify security- and system-level challenges that can occur when applying DTLS. FDTLS addresses these challenges by employing asymmetric key generation, a virtual peer, and header reduction-based storage optimization. Our results obtained using a Contiki-based implementation on OpenMote platforms show that compared to using storage and networking security separately, FDTLS can reduce the latency of packet transmission responses and also contribute to saving energy.

Original languageEnglish
Title of host publicationMobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services
PublisherAssociation for Computing Machinery, Inc
Pages570-571
Number of pages2
ISBN (Electronic)9781450366618
DOIs
Publication statusPublished - 2019 Jun 12
Event17th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2019 - Seoul, Korea, Republic of
Duration: 2019 Jun 172019 Jun 21

Publication series

NameMobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services

Conference

Conference17th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys 2019
Country/TerritoryKorea, Republic of
CitySeoul
Period19/6/1719/6/21

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Towards supporting IoT device storage and network security using DTLs'. Together they form a unique fingerprint.

Cite this