Poster Abstract: Security Comes First, A Public-key Cryptography Framework for the Internet of Things

被引:11
|
作者
Shafagh, Hossein [1 ]
Hithnawi, Anwar [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
关键词
D O I
10.1109/DCOSS.2014.62
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Novel Internet services are emerging around an increasing number of sensors and actuators in our surroundings, commonly referred to as smart devices. Smart devices, which form the backbone of the Internet of Things (IoT), enable alternative forms of user experience by means of automation, convenience, and efficiency. At the same time new security and safety issues arise, given the Internet-connectivity and the interaction possibility of smart devices with human's proximate living space. Hence, security is a fundamental requirement of the IoT design. In order to remain interoperable with the existing infrastructure, we postulate a security framework compatible to standard IP-based security solutions, yet optimized to meet the constraints of the IoT ecosystem. In this ongoing work, we first identify necessary components of an interoperable secure End-to-End communication while incorporating Public-key Cryptography (PKC). To this end, we tackle involved computational and communication overheads. The required components on the hardware side are the affordable hardware acceleration engines for cryptographic operations and on the software side header compression and long-lasting secure sessions. In future work, we focus on integration of these components into a framework and the evaluation of an early prototype of this framework.
引用
收藏
页码:135 / 136
页数:2
相关论文
共 50 条
  • [31] Public-key cryptography and invariant theory
    Grigoriev D.
    [J]. Journal of Mathematical Sciences, 2005, 126 (3) : 1152 - 1157
  • [32] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290
  • [33] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    [J]. CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [34] A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
    Malik, Manisha
    Dutta, Maitreyee
    Granjal, Jorge
    [J]. IEEE ACCESS, 2019, 7 : 27443 - 27464
  • [35] Hierarchical key assignment without public-key cryptography
    Lin, CH
    [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [36] Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things
    Samia Belattaf
    Mohamed Mohammedi
    Mawloud Omar
    Rachida Aoudjit
    [J]. Wireless Personal Communications, 2021, 120 : 113 - 137
  • [37] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [38] Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things
    Belattaf, Samia
    Mohammedi, Mohamed
    Omar, Mawloud
    Aoudjit, Rachida
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 113 - 137
  • [39] Quantum Cryptography for Internet of Things Security
    Alekha Parimal Bhatt
    Anand Sharma
    [J]. Journal of Electronic Science and Technology., 2019, 17 (03) - 220
  • [40] Quantum cryptography for internet of things security
    Bhatt, Alekha Parimal
    Sharma, Anand
    [J]. Journal of Electronic Science and Technology, 2019, 17 (03) : 213 - 220