Secure Provisioning for Achieving End-to-End Secure Communications

被引:2
|
作者
Sousa, Patricia R. [1 ]
Resende, Joao S. [1 ]
Martins, Rolando [1 ]
Antunes, Luis [1 ]
机构
[1] CRACS INESC TEC, DCC FCUP, Porto, Portugal
关键词
D O I
10.1007/978-3-030-31831-4_34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth of the Internet of Things (IoT) is raising significant impact in several contexts, e.g., in cities, at home, and even attached to the human body. This digital transformation is happening at a high pace and causing a great impact in our daily lives, namely in our attempt to make cities smarter in an attempt to increase their efficiency while reducing costs and increasing safety. However, this effort is being supported by the massive deployment of sensors throughout cities worldwide, leading to increase concerns regarding security and privacy. While some of these issues have already been tackled, device authentication remains without a viable solution, specially when considering a resilient decentralized approach that is the most suitable for this scenario, as it avoids some issues related to centralization, e.g., censorship and data leakage or profit from corporations. The provisioning is usually an arduous task that encompasses device configuration, including identity and key provisioning. Given the potential large number of devices, this process must be scalable and semi-autonomous, at least. This work presents a novel approach for provisioning IoT devices that adopts an architecture where other device acts as a manager that represents a CA, allowing it to be switched on/off during the provisioning phase to reduce single point of failure (SPOF) problems. Our solution combines One Time Password (OTP) on a secure token and cryptographic algorithms on a hybrid authentication system.
引用
收藏
页码:498 / 507
页数:10
相关论文
共 50 条
  • [1] Efficient Key Authentication Service for Secure End-to-End Communications
    Etemad, Mohammad
    Kupcu, Alptekin
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 183 - 197
  • [2] END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION
    Sun, Zhuo
    Wu, Hengmiao
    Zhao, Chenglin
    Yue, Gang
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (05) : 88 - 95
  • [3] An Add-on End-to-end Secure Email Solution in Mobile Communications
    Zhao, Shushan
    Liu, Shuping
    [J]. 10TH EAI INTERNATIONAL CONFERENCE ON MOBILE MULTIMEDIA COMMUNICATIONS (MOBIMEDIA 2017), 2017, : 63 - 67
  • [4] End-to-end Secure Insurance Telematics
    Salant, Eliot
    Gershinsky, Gidon
    [J]. SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 182 - 182
  • [5] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    [J]. SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [6] Universally Composable End-to-End Secure Messaging
    Canetti, Ran
    Jain, Palak
    Swanberg, Marika
    Varia, Mayank
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 3 - 33
  • [7] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [8] Secure End-to-End Transport Over SCTP
    Hohendorf, Carsten
    Rathgeb, Erwin P.
    Unurkhaan, Esbold
    Tuexen, Michael
    [J]. JOURNAL OF COMPUTERS, 2007, 2 (04) : 31 - 40
  • [9] Secure end-to-end transport over SCTP
    Hohendorf, Carsten
    Rathgeb, Erwin P.
    Unurkhaan, Esbold
    Tuexen, Michael
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 381 - 395
  • [10] A Secure End-to-End Mobile Chat Scheme
    Chen , Hsing-Chung
    Wen, Jyh-Horng
    Yang, Cheng-Ying
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 472 - 477