Poster Abstract: Security Comes First, A Public-key Cryptography Framework for the Internet of Things

被引:11
|
作者
Shafagh, Hossein [1 ]
Hithnawi, Anwar [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
关键词
D O I
10.1109/DCOSS.2014.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Novel Internet services are emerging around an increasing number of sensors and actuators in our surroundings, commonly referred to as smart devices. Smart devices, which form the backbone of the Internet of Things (IoT), enable alternative forms of user experience by means of automation, convenience, and efficiency. At the same time new security and safety issues arise, given the Internet-connectivity and the interaction possibility of smart devices with human's proximate living space. Hence, security is a fundamental requirement of the IoT design. In order to remain interoperable with the existing infrastructure, we postulate a security framework compatible to standard IP-based security solutions, yet optimized to meet the constraints of the IoT ecosystem. In this ongoing work, we first identify necessary components of an interoperable secure End-to-End communication while incorporating Public-key Cryptography (PKC). To this end, we tackle involved computational and communication overheads. The required components on the hardware side are the affordable hardware acceleration engines for cryptographic operations and on the software side header compression and long-lasting secure sessions. In future work, we focus on integration of these components into a framework and the evaluation of an early prototype of this framework.
引用
收藏
页码:135 / 136
页数:2
相关论文
共 50 条
  • [1] A Framework for Automatic Security Proof of public-key cryptography in Computational Model
    Guang Yan
    Fei Jin-Long
    Gu Chun-Xiang
    Zhu Yue-Fei
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 882 - 886
  • [2] Generalized public-key cryptography with tight security
    Wu, Ge
    Guo, Fuchun
    Susilo, Willy
    [J]. INFORMATION SCIENCES, 2019, 504 : 561 - 577
  • [3] Information security, mathematics, and public-key cryptography
    Blake-Wilson, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 77 - 99
  • [4] Information Security, Mathematics, and Public-Key Cryptography
    Simon Blake-Wilson
    [J]. Designs, Codes and Cryptography, 2000, 19 : 77 - 99
  • [5] Virtual microscopy and public-key cryptography for Internet telepathology
    Strauss, JS
    Felten, CL
    Okada, DH
    Marchevsky, AM
    [J]. JOURNAL OF TELEMEDICINE AND TELECARE, 1999, 5 (02) : 105 - 110
  • [6] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    [J]. AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [7] A Security Framework for the Internet of Things based on Public Key Infrastructure
    Ning, Hong
    [J]. CONSTRUCTION AND URBAN PLANNING, PTS 1-4, 2013, 671-674 : 3223 - 3226
  • [8] Recent progress in the security evaluation of multivariate public-key cryptography
    Ikematsu, Yasuhiko
    Nakamura, Shuhei
    Takagi, Tsuyoshi
    [J]. IET INFORMATION SECURITY, 2023, 17 (02) : 210 - 226
  • [9] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [10] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    [J]. SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &