TU Darmstadt / ULB / TUbiblio

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

Aragon, Santiago ; Tiloca, Marco ; Maass, Max ; Hollick, Matthias ; Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: IEEE Conference on Communications and Network Security,
IEEE, 6th IEEE Conference on Communications and Network Security (CNS 2018), Beijing, China, 30.05.-01.06.2018, ISBN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Conference or Workshop Item]

Abstract

The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grained access control in the Internet of Things, where devices are resource-constrained and with limited connectivity. The ACE framework defines separate profiles to specify how exactly entities interact and what security and communication protocols to use. This paper presents the novel ACE IPsec profile, which specifies how a client establishes a secure IPsec channel with a resource server, contextually using the ACE framework to enforce authorized access to remote resources. The profile makes it possible to establish IPsec Security Associations, either through their direct provisioning or through the standard IKEv2 protocol. We provide the first Open Source implementation of the ACE IPsec profile for the Contiki OS and test it on the resource-constrained Zolertia Firefly platform. Our experimental performance evaluation confirms that the IPsec profile and its operating modes are affordable and deployable also on constrained IoT platforms.

Item Type: Conference or Workshop Item
Erschienen: 2018
Creators: Aragon, Santiago ; Tiloca, Marco ; Maass, Max ; Hollick, Matthias ; Raza, Shahid
Title: ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control
Language: English
Abstract:

The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grained access control in the Internet of Things, where devices are resource-constrained and with limited connectivity. The ACE framework defines separate profiles to specify how exactly entities interact and what security and communication protocols to use. This paper presents the novel ACE IPsec profile, which specifies how a client establishes a secure IPsec channel with a resource server, contextually using the ACE framework to enforce authorized access to remote resources. The profile makes it possible to establish IPsec Security Associations, either through their direct provisioning or through the standard IKEv2 protocol. We provide the first Open Source implementation of the ACE IPsec profile for the Contiki OS and test it on the resource-constrained Zolertia Firefly platform. Our experimental performance evaluation confirms that the IPsec profile and its operating modes are affordable and deployable also on constrained IoT platforms.

Title of Book: IEEE Conference on Communications and Network Security
Publisher: IEEE
ISBN: 978-1-5386-4586-4
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Sichere Mobile Netze
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Event Title: 6th IEEE Conference on Communications and Network Security (CNS 2018)
Event Location: Beijing, China
Event Dates: 30.05.-01.06.2018
Date Deposited: 26 Aug 2018 19:55
DOI: 10.1109/CNS.2018.8433209
Official URL: https://tuprints.ulb.tu-darmstadt.de/7696
URN: urn:nbn:de:tuda-tuprints-76966
Corresponding Links:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details