an energy efficiency analysis of lightweight security protocols
TRANSCRIPT
1
An Energy Efficiency Analysis of Lightweight Security Protocols for
M2M/IoT
Khamdamboy Urunov, a Ph.D. student.
Special Communication Research Center.,
Graduate School of Financial Information Security, Kookmin
University Seoul, South Korea
2
ContentsI. IntroductionII. Resource constrained environment protocols in M2M/IoT
2.1 The IoT resource constrained device protocol stack 2.2 M2M/IoT Application protocol2.3 Pros and Cons of constrained application. Energy efficiency constrained
protocols III. Energy efficiency of Lightweight secure protocols for M2M/IoT
3.1. Security Lightweight protocols for M2M/IoT3.2. Security Lightweight protocols capabilities3.3. Output of an energy efficiency in IoT and future simulation result
IV. Conclusion V. Reference
3
IntroductionThe Internet of Things (IoT) consists of two different type environments:
resource-constrained resource-rich devices
This paper covered energy consumption and an efficiency for the IoT security protocols and other aspects.
Our goal analysis of constrained lightweight protocols CoAP MQTT AMQT XMPP
The security facilities are adjusting the whole process of network protocols PANA HIP-DEX CB-ABE XACML
4
II. RESOURCE CONSTRAINED ENVIRONMENT PROTOCOLS IN M2M/IOT
The heterogeneous network interconnection is established via the internet and the security requirements should be consistent with the existing Internet environment.
The main reason in analysis process has getting various low memory availability powerlow bandwidth requirement high packet loss combined
Our goal analysis of constrained lightweight protocols CoAP (The Constrained Application Protocol) MQTT (Message Queue Telemetry Transport) AMQT (Advanced Message Queueing Protocol) XMPP (Extensible Messaging and Presence Protocol)
5
2.1. The IoT resource constrained device protocol stack
IoT architecture layer protocols should make provision interoperability system network
Fig.1 Architecture constrained IoT protocols
The Electronic Product Code (EPC) a unique identification number an RFID tag is used basically in the supply chain management to identify
items Z-Wave: a low-power wireless communication protocol for Home
Automation Networks (HAN) has been used widely in the remote control applications in smart
homes small-size commercial domains 30 meters point-to-point communication
6
2.2. M2M/IoT Application protocol
Fig.2 CoAP protocol functionality
Application Layer Protocols: CoAP AMQP XMPP MQTT and REST HTTP CoAP (The Constrained Application Protocol)
7Fig.3 MQTT application protocol functionality
The MQTT protocol represents an ideal messaging protocol for the IoT and M2M communications.
2.2. M2M/IoT Application protocol (cont...)
MQTT (Message Queue Telemetry Transport)
to provide routing for smallcheap low power low memory devices in
vulnerable low bandwidth networks
8
2.3. Pros and Cons of constrained application. Energy efficiency constrained protocols
CoAP is more efficient than HTTP less that MQTT protocolthe most important point is the network real-time communicationmessaging protocol XMPP has been verifying applicability to real-time
communications on the web MQTT delivers messages with a lower delay than CoAP when the packet loss
rate is low the packet loss rate is high, CoAP outperforms MQTT the case of small size messages and a loss rate of 25%,CoAP outperforms MQTT in generating less extra traffic
Fig.4 IoT protocol layer solution
Pros and Cons solution:
9
III. ENERGY EFFICIENCY OF LIGHTWEIGHT SECURE PROTOCOLS FOR M2M/IOT
Distributed Capability-based Access Control (DCap-BAC) approach, in order to establish the notions of a secure and privacy-preserving M2M-enabled IoT.
DCap-BAC token it can make use of CoAP-DTLS exchange attaching the credential for a secure and protected M2M communication.
Lightweight Directory Access Protocol (LDAP), is an Internet protocol that email and other programs use to look up information from a server. It is essentially a distributed database.
IoT bootstrapping protocols consists of such kind of Host Identity Protocol Diet Exchange (HIP-DEX) security protocol.
10
3.1. Security Lightweight protocols for M2M/IoT
The main authentication and authorization for communication distinguish two smart objects, given the global scale of the IoT, it is like that smart objects often operate as groups of entities (interaction or collaborating for a common purpose). Security bootstrapping process usually consists of a set of procedures in which a node is installed and commissioned within a network.
Fig.5 Operational Security protocols for M2M/IoT
11
3.2. Security Lightweight protocols capabilities
PANA - Protocol for Carrying Authentication for Network Access represent lighter option to transfer EAP (Extensible Authentication Protocol), which is an important feature.
Distributed Capability-based Access Control (DCap-BAC) in order to establish the notions of a secure and privacy-preserving M2M-enabled IoT.
Lightweight Directory Access Protocol (LDAP) is an Internet protocol that email and other programs use to look up information from a server.
XACML as standard access control technology after the smart object consumer obtains the required DCap-BAC token it can make use of CoAP-DTLS exchange attaching the credential for a secure and protected M2M communication.
Cipher text - Policy Attribute-Based Encryption (CB-ABE) has been recently proposed as a highly flexible cryptographic scheme, with provides the ability to define groups and subgroups of smart objects according to a different combination of identity attributes.
12
3.3. Output of an energy efficiency in IoT and future simulation result
DCap-BAC has already been proven as an efficient and flexible access control approach for IoT environments
it does not support privacy-preserving features. PANA is the only protocol that is able to operate between several
IP hops and to interact with AAA infrastructures for network access control
Table.1- Security protocols definition and energy efficiency
13
CONCLUSION
already analysis CoAP, MQTT, XMPP – TLS/DTLS and PANA, LDAP, XIP-DEX security protocols
possible energy efficiency and security reliability are incoming more society life
QualNet or Matlab simulator facility is not support M2M protocols, but near the future it will simulate and useability
the CoAP protocol the data exchanging process delay and loss data while will simulate and implement DTN (Delay Tolerant Network) Bundle Layer mechanism
In our future plan make a CoAP and MQTT protocol for Underwater (it’s called u-CoAP u-MQTT)
Future plan make a security communication underwater u-CoAP, u-MQTT protocols