4. A standard based end-to-end security architecture
Our system architecture is following the IoT model. We
assume that the Internet is connected by IPv6 in the near
future, and parts of it run 6LoWPAN. The Transport layer
in 6LoWPAN is UDP which can be considered unreliable,
the routing layer is RPL [18] or Hydro [7]. Our implementation
uses Hqydro for routing, because at the time of writing
our implementation code there was no avaliable RPL
implementation for TinyOS. RPL has since been standardized
in RFC 6550 and is distributed with newer versions
of TinyOS. However, both routing protocols are similar enough
so that a change should have negligible impact on the
presented results. IEEE 802.15.4 is used for the physical
and Media Access Control layer. Based on this protocol
stack we chose DTLS as our security protocol which places
it in the application layer on top of the UDP transport layer.
Fig. 3 summarizes the protocols used in our architecture.
Similar to security needs in traditional networks such as
the Internet, we consider three security goals:
Authenticity: Recipients of a message can identify their
communication partners and can detect if the sender
information has been forged.
Integrity: Communication partners can detect changes
to a message during transmission.
Confidentiality: Attackers cannot gain knowledge
about the contents of a secured message.
By choosing DTLS as the security protocol we can
achieve these goals. DTLS is a modification of TLS for the
unreliable UDP and inherits its security properties [19].
Using an application layer security protocol like DTLS as
opposed to link or network layer security protocols such
as MiniSec [9] has a number of advantages but also some
drawbacks:
Lower layer security protocols do not provide end-toend
communication security. On each hop in a multi-hop