Security protocols in constrained environments

0 %
100 %
Information about Security protocols in constrained environments
Technology

Published on February 20, 2014

Author: cpswan

Source: slideshare.net

Description

From Open Source Hardware Users Group (OSHUG #31)

Security protocols in constrained environments Chris Swan @cpswan

TL;DR System type Such as Will it work? The issue Low end embedded Atmel 8-bit AVR (most Arduino), TI MSP-430 No SRAM Mid-high end embedded Anything ARM based (e.g. STM Discovery, TI Stellaris) inc. Arduino Due With some effort Library, key and cipher suite wrangling Linux OS Raspberry Pi, BeagleBone, Arduino Yún Yes -

Agenda • Anatomy of a security protocol – The key exchange dance • • • • Linux makes things easy Libraries for higher end microcontrollers SRAM on low end microcontrollers Summary

Which security protocols? The ‘S’ protocols: Secure Sockets Layer (SSL) Superseded by Transport Layer Security (TLS) Secure SHell (SSH) Internet Protocol Security (IPsec)

SSL Handshake

Client Hello

It’s a similar story for SSH

and IPsec

Linux makes this easy If not already built in to a particular distribution then use favourite package manager to get: (no relation)

Things get trickier with embedded But by no means impossible…

Stack trades offs may be made

But those keys won’t fit into 2K At least not with anything resembling a useful application… … Arduino struggles with MQTT and 1wire

Summary System type Such as Will it work? The issue Low end embedded Atmel 8-bit AVR (most Arduino), TI MSP-430 No SRAM Mid-high end embedded Anything ARM based (e.g. STM Discovery, TI Stellaris) inc. Arduino Due With some effort Library, key and cipher suite wrangling Linux OS Raspberry Pi, BeagleBone, Arduino Yún Yes -

Questions?

Further reading PolarSSL tutorial https://polarssl.org/kb/how-to/polarssl-tutorial AVR32753: AVR32 UC3 How to connect to an SSL-server http://www.atmel.com/Images/doc32111.pdf STM32 Discovery: Porting Polar SSL http://hobbymc.blogspot.co.uk/2011/02/stm32discovery-porting-polar-ssl.html

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

OSHUG 31 — Security protocols in constrained ...

Want to watch this again later? Sign in to add this video to a playlist. Implementation of security protocols such as TLS, SSH or IPsec come ...
Read more

Security protocols in constrained environments | Chris ...

With more time I’d like to get some quantitative material on the memory footprint of various cipher suites and key lengths in embedded environments (and ...
Read more

Authentication and Authorization for Constrained ...

such a protocol is the Constrained ... useful as basis for a solution for constrained environments. These protocols, ... Other security protocols may be ...
Read more

Authentication and Authorization for Constrained Environments

Document Charter Authentication and Authorization for Constrained Environments WG Title: Authentication and Authorization for Constrained Environments
Read more

DTLS In Constrained Environments (DICE) BOF

DTLS In Constrained Environments (DICE) BOF ... – Suitable range of security modes & ciphers are ... – Not clear what DTLS protocols, ...
Read more

Datagram Transport Layer Security in Constrained Environments

Datagram Transport Layer Security in Constrained Environments ... Protocol profile for constrained environments Use of DTLS in a particular way, e.g.
Read more

Comments on Security protocols in constrained environments

... thestateofme.com/2014/02/21/security-protocols-in-constrained-environments/feed/atom ... presentation on security protocols in constrained ...
Read more

draft-ietf-ace-actors-02 - An architecture for ...

... 2015 An architecture for authorization in constrained environments draft ... End-to-End Security ... Less-Constrained Level Protocols ...
Read more