is implementation-dependent, and in our ECDH im-
plementation it is a two-dimensional Elliptic Curve
point. The total size of the point is equal to
twice the size of the generated Master Secret. In
Auth_Request(Auth, OT P), both values are fixed at 16
bytes each. Auth_Granted({ID
s
}
KT
sg
) has a payload
of size equal to ID
s
. Table 2 shows the total commu-
nication overhead for these 4 messages, for varying
sizes of ID and Master Secret.
Table 2: Total communication overhead (in bytes) for key
establishment for varying sizes of Master Secret (rows) and
ID (columns).
ID size 16 20 32
MS size
16 116 120 132
20 132 136 148
24 148 152 164
6 CONCLUSIONS
This paper presented a trustful infrastructure for the
IoT developed within the realm of project EPOS. As-
pects such as people privacy in respect to traffic pat-
tern analysis and data dependability have not been
considered in this paper. Also, optimized implemen-
tations and secure group communication are topics
left as future work and are currently under study.
The proposed infrastructure was implemented
around the EPOSMoteII platform and delivered to
end users through a trustful communication protocol
stack. Trustfulness for the infrastructure was achieved
through a combination of mechanisms. A practical
key establishment protocol based on AES, Poly1305-
AES, time synchronization, Diffie-Hellman and sen-
sor IDs was proposed to achieve confidentiality, au-
thentication, integrity and prevention from replay at-
tacks. The proposal was experimentally evaluated in
terms of running time in a real-world implementation.
The results confirm that the proposed infrastructure
can provide the security needed without introducing
excessive overhead to a network of things, a key step
in making the Internet of Things a daily reality.
REFERENCES
Atzori, L., Iera, A., and Morabito, G. (2010). The internet
of things: A survey. Computer Networks, 54(15):2787
– 2805.
Bernstein, D. J. (2005). The poly1305-aes message-
authentication code. In Proceedings of Fast Software
Encryption, pages 32–49, Paris, France.
Brown, M., Hankerson, D., López, J., and Menezes, A.
(2001). Software implementation of the nist ellip-
tic curves over prime fields. In Naccache, D., editor,
Topics in Cryptology - CT-RSA 2001, volume 2020 of
Lecture Notes in Computer Science, pages 250–265.
Springer Berlin Heidelberg.
Chang, J.-T., Liu, S., Gaudiot, J., and Liu, C. (2010).
Hardware-assisted security mechanism: The acceler-
ation of cryptographic operations with low hardware
cost. In Performance Computing and Communica-
tions Conference (IPCCC), 2010 IEEE 29th Interna-
tional, pages 327 –328.
Elkhodr, M., Shahrestani, S., and Cheung, H. (2013). The
internet of things: Visions & challenges. In TENCON
Spring Conference, pages 218 – 222.
EPOS (2014). Epos project website. http://epos.
lisha.ufsc.br.
Fröhlich, A. A., Okazaki, A. M., Steiner, R. V., Oliveira, P.,
and Martina, J. E. (2013). A cross-layer approach to
trustfulness in the internet of things. In 9th Workshop
on Software Technologies for Embedded and Ubiqui-
tous Systems (SEUS), Paderborn, Germany.
Fröhlich, A. A., Steiner, R., and Rufino, L. M. (2011). A
trustful infrastructure for the internet of things based
on eposmote. In 9th IEEE International Conference
on Dependable, Autonomic and Secure Computing,
pages 63–68, Sydney, Australia.
Fu, X., Graham, B., Bettati, R., and Zhao, W. (2003).
Active traffic analysis attacks and countermeasures.
In Proceedings of the 2003 International Conference
on Computer Networks and Mobile Computing, ICC-
NMC ’03, pages 31–, Washington, DC, USA. IEEE
Computer Society.
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., and Zhang,
J. (2003). Fast authenticated key establishment pro-
tocols for self-organizing sensor networks. In Pro-
ceedings of the 2Nd ACM International Conference on
Wireless Sensor Networks and Applications, WSNA
’03, pages 141–150, New York, NY, USA. ACM.
Jinwala, D., Patel, D., Patel, S., and Dasgupta, K. (2009).
Replay protection at the link layer security in wireless
sensor networks. In Computer Science and Informa-
tion Engineering, 2009 WRI World Congress on, vol-
ume 1, pages 160 –165.
Karlof, C., Sastry, N., and Wagner, D. (2004). Tinysec: a
link layer security architecture for wireless sensor net-
works. In Proceedings of the 2nd international confer-
ence on Embedded networked sensor systems, SenSys
’04, pages 162–175, New York, NY, USA. ACM.
Li-ping, Z. and Yi, W. (2009). An id-based key agreement
protocol for wireless sensor networks. In 1st Interna-
tional Conference on Information Science and Engi-
neering (ICISE), pages 2542 – 2545.
Luk, M., Mezzour, G., Perrig, A., and Gligor, V. (2007).
Minisec: A secure sensor network communication ar-
chitecture. In Information Processing in Sensor Net-
works, 2007. IPSN 2007. 6th International Sympo-
sium on, pages 479 –488.
Menezes, A., van Oorschot, P., and Vanstone, S. (1996).
Handbook of Applied Cryptography. CRC Press.
KeyEstablishmentandTrustfulCommunicationfortheInternetofThings
205