Top Banner
Delegation-based Authentication and Authorization for the IP-based IoT Embedded Security Lab. Park Joon-young
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Delegation-based Authentication and Authorization for the IP-based IoT

Delegation-based Authentication and Authorization

for the IP-based IoTEmbedded Security Lab.

Park Joon-young

Page 2: Delegation-based Authentication and Authorization for the IP-based IoT

Contents

• DTLS Protocol

• Motive

• Design

• Evaluation

• Conclusion

Page 3: Delegation-based Authentication and Authorization for the IP-based IoT

About Paper

• 2014, IEEE SECON(Sensing, Communication, and Networking)

Page 4: Delegation-based Authentication and Authorization for the IP-based IoT

Introduction

Limited Processing Power

Limited Storage

Low Bandwidth

Inefficient Energy

Unreliable Environment

Sensors will have..

Page 5: Delegation-based Authentication and Authorization for the IP-based IoT

DTLS Protocol

• TLS on Datagram

• 6 Message Flight

• Public-key-based + Symmetric-key-based

• Verifies correctness

Page 6: Delegation-based Authentication and Authorization for the IP-based IoT

Public-key in DTLS

•Computation

•Transmission

•Memory Overheads

Page 7: Delegation-based Authentication and Authorization for the IP-based IoT

Run-time Req. (RAM)

• Public-key Calculation + Certificate Parsing (1.4kB)

• DTLS handshake (1.3kB) + stack size (1.8kB)

6.2kB + 1.8kB10kB10kB

OSAPP

Page 8: Delegation-based Authentication and Authorization for the IP-based IoT

Implementation Size (ROM)

•DTLS handshake (relic toolkit, 16kB)

•Certificate Parsing (1.5kB) + Certificate Verification + Time Synchronization

64kB RAM + ROM

Page 9: Delegation-based Authentication and Authorization for the IP-based IoT

Design

Original This Paper

Page 10: Delegation-based Authentication and Authorization for the IP-based IoT

Design

•Delegation Server- Key Distribution Center- DTLS handshake with remote end-point

Page 11: Delegation-based Authentication and Authorization for the IP-based IoT

Bootstrapping a constrained Device

D

DS R

D

D

Physical contact or Wireless communication

Page 12: Delegation-based Authentication and Authorization for the IP-based IoT

Delegation

D

DS R

D

D

DTLS handshake

Page 13: Delegation-based Authentication and Authorization for the IP-based IoT

Delegation

D

DS R

D

D

Session Resumption

Page 14: Delegation-based Authentication and Authorization for the IP-based IoT

Revocation

D

DS R

D

D

Page 15: Delegation-based Authentication and Authorization for the IP-based IoT

Revocation

D

DS R

D

D

Page 16: Delegation-based Authentication and Authorization for the IP-based IoT

Revocation

D

DS R

D

D

symmetric-key-based DTLS handshake

Page 17: Delegation-based Authentication and Authorization for the IP-based IoT

Evaluation• symmetric-key-based tinyDTLS (openSSL)

• WiSMote platform (Arduino, raspberry pi..)

• 16MHz MSP430 µ-controller (intel i3-2500, ARM..)

• 16kB RAM, 128kB ROM

• Contiki OS (Windows, Linux..)

• FlockLab (oscilloscope)

Page 18: Delegation-based Authentication and Authorization for the IP-based IoT

EvaluationRAM / ROM

RAM

ROM

Page 19: Delegation-based Authentication and Authorization for the IP-based IoT

EvaluationRun-time

Client-side Computation Server-side Computation

Verification / Decryption of Session Ticket Generating new Session Ticket

Page 20: Delegation-based Authentication and Authorization for the IP-based IoT

EvaluationRun-time

Page 21: Delegation-based Authentication and Authorization for the IP-based IoT

Transmission

EvaluationRun-time

Certificate Symmetric Delegation

Page 22: Delegation-based Authentication and Authorization for the IP-based IoT

Conclusion

• Proposed delegation architecture

• Provides comprehensive, compact solution for authentication, authorization, secure transmission