Secure Ownership Transfer for Resource Constrained IoT Infrastructures

被引:0
|
作者
Gunnarsson, Martin [1 ]
Gehrmann, Christian [2 ]
机构
[1] RISE, Ole Romers Vag 5A, Lund, Sweden
[2] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
基金
欧盟地平线“2020”;
关键词
IoT; Ownership transfer; Constrained devices; E-HEALTH SYSTEMS; TRANSFER PROTOCOL; TAG OWNERSHIP; INTERNET; KEY; AUTHENTICATION; SCHEME; THINGS;
D O I
10.1007/978-3-030-94900-6_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol's resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. The results presented in this paper, an extend version of previously published work on secure ownership transfer protocols for constrained IoT devices by the same authors.
引用
收藏
页码:22 / 47
页数:26
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [2] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)
  • [3] Secure Ownership and Ownership Transfer in RFID Systems
    van Deursen, Ton
    Mauw, Sjouke
    Radomirovic, Sasa
    Vullers, Pim
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 637 - 654
  • [4] Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption
    Ngouen, Maurice
    Rahman, Mohammad Ashiqur
    Prabakar, Nagarajan
    Uluagac, Selcuk
    Njilla, Laurent
    2023 10TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2023, : 141 - 148
  • [5] Secure the ownership of WoT devices using secure ownership transfer framework
    Singh K.
    Tomar D.S.
    International Journal of Information Technology, 2023, 15 (4) : 2161 - 2171
  • [6] A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    Yilmaz, Selim
    Aydogan, Emre
    Sen, Sevil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4405 - 4418
  • [7] Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices
    Karati, Arijit
    Fan, Chun-I
    Hsu, Ruei-Hau
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10431 - 10440
  • [8] Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (01) : 411 - 420
  • [9] Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT
    Solomon, Gabriel Jerome
    Zhang, Peng
    Liu, Yuhong
    Brooks, Rachael
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 371 - 386
  • [10] Cognitive Secure Shield - A Machine Learning enabled threat shield for resource constrained IoT Devices
    Vuppalapati, Jaya Shankar
    Kedari, Santosh
    Ilapakurti, Anitha
    Vuppalapati, Chandrasekar
    Chauhan, Chitanshu
    Mamidi, Vanaja
    Rautji, Surbhi
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1073 - 1080