Secure Provisioning for Achieving End-to-End Secure Communications

被引:2
|
作者
Sousa, Patricia R. [1 ]
Resende, Joao S. [1 ]
Martins, Rolando [1 ]
Antunes, Luis [1 ]
机构
[1] CRACS INESC TEC, DCC FCUP, Porto, Portugal
关键词
D O I
10.1007/978-3-030-31831-4_34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth of the Internet of Things (IoT) is raising significant impact in several contexts, e.g., in cities, at home, and even attached to the human body. This digital transformation is happening at a high pace and causing a great impact in our daily lives, namely in our attempt to make cities smarter in an attempt to increase their efficiency while reducing costs and increasing safety. However, this effort is being supported by the massive deployment of sensors throughout cities worldwide, leading to increase concerns regarding security and privacy. While some of these issues have already been tackled, device authentication remains without a viable solution, specially when considering a resilient decentralized approach that is the most suitable for this scenario, as it avoids some issues related to centralization, e.g., censorship and data leakage or profit from corporations. The provisioning is usually an arduous task that encompasses device configuration, including identity and key provisioning. Given the potential large number of devices, this process must be scalable and semi-autonomous, at least. This work presents a novel approach for provisioning IoT devices that adopts an architecture where other device acts as a manager that represents a CA, allowing it to be switched on/off during the provisioning phase to reduce single point of failure (SPOF) problems. Our solution combines One Time Password (OTP) on a secure token and cryptographic algorithms on a hybrid authentication system.
引用
收藏
页码:498 / 507
页数:10
相关论文
共 50 条
  • [41] End-to-end secure connection in heterogeneous networks for critical scenarios
    Giuliano, Romeo
    Neri, Alessandro
    Valletta, Damiano
    [J]. 2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 264 - 269
  • [42] A framework for an end-to-end secure wireless smart home system
    Al-Qutayri, M.
    Barada, H.
    Al-Mehairi, S.
    Nuaimi, J.
    [J]. 2008 2ND ANNUAL IEEE SYSTEMS CONFERENCE, 2008, : 420 - 426
  • [43] SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
    Ambrosin, Moreno
    Conti, Mauro
    Ibrahim, Ahmad
    Sadeghi, Ahmad-Reza
    Schunter, Matthias
    [J]. COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 595 - 617
  • [44] A Secure End-to-End Cloud Computing Solution for Emergency Management with UAVs
    Liao, Qi
    Fischer, Thomas
    Gao, Jack
    Hafeez, Faisal
    Oechsner, Carl
    Knode, Jana
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [45] An End-to-End Exponentially Secure Secrecy Scheme against an Unbounded Adversary
    Khiabani, Yahya S.
    Wei, Shuangqing
    [J]. 2013 47TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2013,
  • [46] A framework for secure end-to-end delivery of messages in publish/subscribe systems
    Pallickara, Shrideep
    Pierce, Marlon
    Gadgil, Harshawardhan
    Fox, Geoffrey
    Yan, Yan
    Huang, Yi
    [J]. 2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2006, : 215 - +
  • [47] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [48] Secure Enablement of Real Time Applications: A Novel End-to-End Approach
    Cakulev, Violeta
    Broustis, Ioannis
    Sundaram, Ganapathy S.
    [J]. BELL LABS TECHNICAL JOURNAL, 2012, 17 (03) : 175 - 191
  • [49] Cloud Challenge: Secure End-to-End Processing of Smart Metering Data
    Brito, Andrey
    Fetzer, Christof
    Kopsell, Stefan
    Pietzuch, Peter
    Pasin, Marcelo
    Felber, Pascal
    Fonseca, Keiko
    Rosa, Marcelo
    Gomes-, Luiz, Jr.
    Riella, Rodrigo
    Prado, Charles
    da Costa Carmo, Luiz F. C.
    Lucani, Daniel E.
    Sipos, Marton
    Nagy, Laszlo
    Feher, Marcell
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 36 - 42
  • [50] Quality-optimized and secure end-to-end authentication for media delivery
    Sun, Qibin
    Apostolopoulos, John
    Chen, Chang Wen
    Chang, Shih-Fu
    [J]. PROCEEDINGS OF THE IEEE, 2008, 96 (01) : 97 - 111