In this paper, we present the design, implementation, and analysis of DNS over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source operating system for the IoT, evaluate performance measures in a testbed, compare with DNS over UDP and DNS over DTLS, and validate our protocol design based on empirical DNS IoT data. Our findings indicate that plain DoC is on par with common DNS solutions for the constrained IoT but significantly outperforms when additional, CoAP standard features are used such as block-wise transfer or caching. With OSCORE for end-to-end security, we can save more than 10 kBytes of code memory compared to DTLS while enabling group communication without compromising the trust chain when using intermediate proxies or caches. We also discuss a scheme for very restricted links that compresses redundant or excessive information by up to 70%.
翻译:在本文中,我们介绍了对受限制的 IoT 设备的安全和隐私友好化名称分辨率的新建议,即CoAP (DoC) 的DNS 的设计、实施和分析。我们在IoT 的开放源操作系统中,在RIOT 中,我们实施不同的设计选择,在测试台评价性能措施,在UDP 和DTLS 上与DNS 进行比较,在经验性DNS IoT 数据的基础上,验证我们的协议设计。我们的研究结果表明,对于受限制的 IoT, 普通的DNS 与通用的DNS 解决方案相同,但在使用额外的CoAP 标准功能, 如块置式传输或缓存时, 明显地超过功能。与终端到终端安全有关的OSCORE可节省超过10千字节的代码存储量, 与 DTLS 相比, 在使用中间准轴或缓存时,我们还可以在不损及信任链的情况下进行集体通信。 我们还讨论一个非常有限的连接计划, 将多余或过多的信息压缩到 70% 。