Poster Abstract: Security Comes First, A Public-key Cryptography Framework for the Internet of Things

被引:11
|
作者
Shafagh, Hossein [1 ]
Hithnawi, Anwar [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
关键词
D O I
10.1109/DCOSS.2014.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Novel Internet services are emerging around an increasing number of sensors and actuators in our surroundings, commonly referred to as smart devices. Smart devices, which form the backbone of the Internet of Things (IoT), enable alternative forms of user experience by means of automation, convenience, and efficiency. At the same time new security and safety issues arise, given the Internet-connectivity and the interaction possibility of smart devices with human's proximate living space. Hence, security is a fundamental requirement of the IoT design. In order to remain interoperable with the existing infrastructure, we postulate a security framework compatible to standard IP-based security solutions, yet optimized to meet the constraints of the IoT ecosystem. In this ongoing work, we first identify necessary components of an interoperable secure End-to-End communication while incorporating Public-key Cryptography (PKC). To this end, we tackle involved computational and communication overheads. The required components on the hardware side are the affordable hardware acceleration engines for cryptographic operations and on the software side header compression and long-lasting secure sessions. In future work, we focus on integration of these components into a framework and the evaluation of an early prototype of this framework.
引用
收藏
页码:135 / 136
页数:2
相关论文
共 50 条
  • [21] A reconfigurable public-key cryptography coprocessor
    Zeng, XY
    Chen, C
    Zhang, QL
    [J]. PROCEEDINGS OF 2004 IEEE ASIA-PACIFIC CONFERENCE ON ADVANCED SYSTEM INTEGRATED CIRCUITS, 2004, : 172 - 175
  • [22] SUBSETS OF GROUPS IN PUBLIC-KEY CRYPTOGRAPHY
    Carvalho, Andre
    Malheiro, Antonio
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024,
  • [23] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [24] Public-key cryptography on the top of a needle
    Batina, Lejla
    Mentens, Nele
    Sakiyarna, Kazuo
    Preneel, Bart
    Verbauwhede, Ingrid
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1831 - 1834
  • [25] Compliance defects in public-key cryptography
    Davis, D
    [J]. PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 171 - 178
  • [26] Teaching Public-Key Cryptography in School
    Keller, Lucia
    Komm, Dennis
    Serafini, Giovanni
    Sprock, Andreas
    Steffen, Bjoern
    [J]. TEACHING FUNDAMENTAL CONCEPTS OF INFORMATICS, PROCEEDINGS, 2010, 5941 : 112 - 123
  • [27] Public-key cryptography for interactive apps
    不详
    [J]. DATAMATION, 1996, 42 (04): : 22 - 22
  • [28] On the Performance of GPU Public-Key Cryptography
    Neves, Samuel
    Araujo, Filipe
    [J]. ASAP 2011 - 22ND IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2011), 2011, : 133 - 140
  • [29] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    [J]. CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [30] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290