Key Establishment and Trustful Communication for the Internet of Things

被引:6
|
作者
Resner, Davi [1 ]
Frohlich, Antonio Augusto [1 ]
机构
[1] Univ Fed Santa Catarina, Software Hardware Integrat Lab, BR-88040900 Florianopolis, SC, Brazil
关键词
Internet of Things; Trustfulness; Security; Key Establishment;
D O I
10.5220/0005262701970206
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work describes a practical solution for the problem of cryptographic key establishment and secure communication in the context of the Internet of Things.ln which computational efficiency is a fundamental requirement. A symmetric-key establishment protocol based on AES, Poly1305-AES. time synchronization. Elliptic Curve Diffie-Hellman and sensor Ms is proposed to achieve data confidentiality, authentication, integrity and prevention from replay attacks. Such a protocol was implemented in the EPOS operating system in the form of a network layer that transparently provides trustfulness. Tests were executed on the EPOSMoteII platform and the analysis of the results shows that the implementation is adequate to be used in the scenario of embedded systems with low processing power.
引用
收藏
页码:197 / 206
页数:10
相关论文
共 50 条
  • [1] Lightweight collaborative key establishment scheme for the Internet of Things
    Ben Saied, Yosra
    Olivereau, Alexis
    Zeghlache, Djamal
    Laurent, Maryline
    [J]. COMPUTER NETWORKS, 2014, 64 : 273 - 295
  • [2] Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things
    Li, Mengya
    Zhang, Ning
    [J]. IEEE ACCESS, 2022, 10 : 111419 - 111448
  • [3] A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
    Sani, Abubakar Sadiq
    Yuan, Dong
    Yeoh, Phee Lep
    Bao, Wei
    Chen, Shiping
    Vucetic, Branka
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [4] A Novel Three Party Key Establishment Scheme in the Context of Internet-of-Things
    Nasiraee, Hassan
    Mohasefi, Jamshid B.
    [J]. 2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [5] Communication in Internet of Things
    Puar, Vivek Hareshbhai
    Bhatt, Chintan M.
    Duong Minh Hoang
    Dac-Nhuong Le
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 : 272 - 281
  • [6] A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 147 - 155
  • [7] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
    Porambage, Pawani
    Braeken, An
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
  • [8] A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment
    Xu, Xiaoxiao
    Han, Mingdan
    Nagarajan, Senthil Murugan
    Anandhan, Prathik
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 : 423 - 430
  • [10] Internet of things: Smart things network and communication
    Pascual Espada, Jordan
    Yager, Ronald R.
    Guo, Bin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 : 118 - 119