Performance evaluation of end-to-end security protocols in an Internet of Things


Wireless Sensor Networks are destined to play a fundamental role in the next-generation Internet, which will be characterized by the Machine-to-Machine paradigm, according to which, embedded devices will actively exchange information, thus enabling the development of innovative applications. It will contribute to assert the concept of Internet of Things, where end-to-end security represents a key issue. In such context, it is very important to understand which protocols are able to provide the right level of security without burdening the limited resources of constrained networks. This paper presents a performance comparison between two of the most widely used security protocols: IPSec and DTLS. We provide the analysis of their impact on the resources of embedded devices. For this purpose, we have modified existing implementations of both protocols to make them properly run on our hardware platforms, and we have performed an extensive experimental evaluation study. The achieved results are not a consequence of a classical simulation campaign, but they have been obtained in a real scenario that uses software and hardware typical of the current technological developments. Therefore, they can help network designers to identify the most appropriate secure mechanism for end-to-end IP communications involving constrained devices.

DOI: 10.1109/SoftCOM.2013.6671893

8 Figures and Tables

Cite this paper

@article{Rubertis2013PerformanceEO, title={Performance evaluation of end-to-end security protocols in an Internet of Things}, author={Antonio De Rubertis and Luca Mainetti and Vincenzo Mighali and Luigi Patrono and Ilaria Sergi and Maria Laura Stefanizzi and Stefano Pascali}, journal={2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)}, year={2013}, pages={1-6} }