Secure Ownership Transfer for the Internet of Things

被引:2
|
作者
Gunnarsson, Martin [1 ,2 ]
Gehrmann, Christian [1 ]
机构
[1] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
[2] RISE, Ole Romers Vag 5A, Lund, Sweden
关键词
IoT; Ownership Transfer; Constrained Devices; TAG;
D O I
10.5220/0008928300330044
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing number of IoT devices deployed, the problem of switching ownership of devices is becoming more apparent. Especially, there is a need for transfer protocols not only addressing a single unit ownership transfer but secure transfer of a complete infrastructure of IoT units including also resource constraint devices. In this paper we present our novel ownership transfer protocol for an infrastructure of IoT devices. The protocol is light-weight as it only uses symmetric key operations on the IoT side. The ownership transfer protocol is carefully security evaluated both using a theoretical analysis and with automatic protocol verification. In addition, we show the feasibility of the ownership transfer protocol through a proof of concept implementation including performance figures.
引用
收藏
页码:33 / 44
页数:12
相关论文
共 50 条
  • [1] Universal and secure object ownership transfer protocol for the Internet of Things
    Ray, Biplob R.
    Abawajy, Jemal
    Chowdhury, Morshed
    Alelaiwi, Abdulhameed
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 838 - 849
  • [2] Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things
    Kiran, M.
    Ray, Biplob
    Hassan, Jahan
    Kashyap, Aman
    Chandrappa, Varun Yarehalli
    [J]. INTERNET OF THINGS, 2024, 25
  • [3] OTP-IoT: An ownership transfer protocol for the Internet of Things
    Mamun, Mohammad Saiful Islam
    Su, Chunhua
    Yang, Anjia
    Miyaji, Atsuko
    Ghorbani, Ali
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 73 - 82
  • [4] Secure Transfer Protocol Research and Design Based on the Internet of Things
    Zhong, Jing
    Liu, Wei
    Wang, Ying Kai
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 619 - +
  • [5] Towards a Secure Internet of Things
    Levis, Phil
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2018, : 1 - 1
  • [6] Secure Implementations for the Internet of Things
    Schmidt, Joern-Marc
    [J]. SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 2 - 2
  • [7] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    [J]. SOUTHEASTCON 2017, 2017,
  • [8] Building an Internet of Secure Things
    Kleidermacher, David
    [J]. COMPUTER, 2020, 53 (08) : 100 - 104
  • [9] Secure Association for the Internet of Things
    Benin, Almog
    Toledo, Sivan
    Tromer, Eran
    [J]. 2015 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2015, : 25 - 34
  • [10] Blockchain Empowered Wireless Power Transfer for Green and Secure Internet of Things
    Jiang, Li
    Xie, Shengli
    Maharjan, Sabita
    Zhang, Yan
    [J]. IEEE NETWORK, 2019, 33 (06): : 164 - 171