Evaluating IP security on lightweight hardware

作者: Andrey Khurri

DOI:

关键词:

摘要: TCP/IP communications stack is being increasingly used to interconnect mobile phones, PDAs, sensor motes and other wireless embedded devices. Although the core functionality of protocols has been successfully adopted lightweight hardware from traditional Internet desktop computers, suitability strong security mechanisms on such devices remains questionable. Insufficient processor, memory battery resources, as well constraints limit applicability many existing that involve computationally intensive operations. Varying capabilities application scenarios with different operational requirements complicate situation further call for agile flexible systems. This study does an empirical evaluation selected IP (resource-constrained) In particular, we evaluate various components Host Identity Protocol (HIP), standardized by Engineering Task Force achieving authentication, shared key negotiation, secure mobility multihoming and, if IPsec, integrity confidentiality user data. Involving a set cryptographic operations, HIP might easily stress client, while affecting performance applications running it shortening lifetime device. We present background related work network-layer security, measurement results obtained representing hardware: Linux Symbian-based smartphones, OpenWrt Wi-Fi access routers platforms. To improve computational energy efficiency HIP, several can substitute standard protocol provide good trade-off between in particular scenarios. describe cases where (i) be unmodified (ii) should tailored or replaced suit resource-constrained environments. The combination presented their serve reference framework building adaptable services future communication

参考文章(111)
Pekka Nikander, Jukka Ylitalo, Jorma Wall, Integrating Security, Mobility and Multi-Homing in a HIP Way network and distributed system security symposium. ,(2003)
Tom Henderson, End-Host Mobility and Multihoming with the Host Identity Protocol RFC. ,vol. 5206, pp. 1- 40 ,(2008)
Robert Moskowitz, Miika Komu, Host Identity Protocol Architecture ,(2019)
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences international cryptology conference. ,vol. 740, pp. 471- 486 ,(1992) , 10.1007/3-540-48071-4_33
P. Jokela, T. Rinta-aho, T. Jokikyyny, J. Wall, M. Kuparinen, H. Mahkonen, Jan Melen, T. Kauppinen, J. Korhonen, Handover performance with HIP and MIPv6 international symposium on wireless communication systems. pp. 324- 328 ,(2004) , 10.1109/ISWCS.2004.1407262
Bruce Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) fast software encryption. pp. 191- 204 ,(1993) , 10.1007/3-540-58108-1_24
C. Perkins, IP Mobility Support for IPv4 RFC. ,vol. 3220, pp. 1- 98 ,(2002)
J.Y.H. So, Jidong Wang, D. Jones, SHIP mobility management hybrid SIP-HIP scheme software engineering artificial intelligence networking and parallel distributed computing. pp. 226- 230 ,(2005) , 10.1109/SNPD-SAWN.2005.68
Jouni Korhonen, IP Mobility in Wireless Operator Networks Helsingin yliopisto. ,(2008)