作者: Andrey Khurri
DOI:
关键词:
摘要: TCP/IP communications stack is being increasingly used to interconnect mobile phones, PDAs, sensor motes and other wireless embedded devices. Although the core functionality of protocols has been successfully adopted lightweight hardware from traditional Internet desktop computers, suitability strong security mechanisms on such devices remains questionable. Insufficient processor, memory battery resources, as well constraints limit applicability many existing that involve computationally intensive operations. Varying capabilities application scenarios with different operational requirements complicate situation further call for agile flexible systems. This study does an empirical evaluation selected IP (resource-constrained) In particular, we evaluate various components Host Identity Protocol (HIP), standardized by Engineering Task Force achieving authentication, shared key negotiation, secure mobility multihoming and, if IPsec, integrity confidentiality user data. Involving a set cryptographic operations, HIP might easily stress client, while affecting performance applications running it shortening lifetime device. We present background related work network-layer security, measurement results obtained representing hardware: Linux Symbian-based smartphones, OpenWrt Wi-Fi access routers platforms. To improve computational energy efficiency HIP, several can substitute standard protocol provide good trade-off between in particular scenarios. describe cases where (i) be unmodified (ii) should tailored or replaced suit resource-constrained environments. The combination presented their serve reference framework building adaptable services future communication