Secure Ownership Transfer for Resource Constrained IoT Infrastructures

被引:0
|
作者
Gunnarsson, Martin [1 ]
Gehrmann, Christian [2 ]
机构
[1] RISE, Ole Romers Vag 5A, Lund, Sweden
[2] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
基金
欧盟地平线“2020”;
关键词
IoT; Ownership transfer; Constrained devices; E-HEALTH SYSTEMS; TRANSFER PROTOCOL; TAG OWNERSHIP; INTERNET; KEY; AUTHENTICATION; SCHEME; THINGS;
D O I
10.1007/978-3-030-94900-6_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol's resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. The results presented in this paper, an extend version of previously published work on secure ownership transfer protocols for constrained IoT devices by the same authors.
引用
收藏
页码:22 / 47
页数:26
相关论文
共 50 条
  • [21] A Scalable and Secure RFID Ownership Transfer Protocol
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 343 - 350
  • [22] Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT
    Iqbal, Muhammad A.
    Bayoumi, Magdy
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 523 - 530
  • [23] IAPN: Framework to secure IoT-based infrastructures using Private APN
    Alsharabi, Naif
    Bhardwaj, Akashdeep
    Alshammari, Talal
    Alotaibi, Shoayee
    Alshammari, Dhahi
    Jadi, Amr
    EGYPTIAN INFORMATICS JOURNAL, 2025, 30
  • [24] Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain
    Nawaz, Anum
    Pena Queralta, Jorge
    Guan, Jixin
    Awais, Muhammad
    Gia, Tuan Nguyen
    Bashir, Ali Kashif
    Kan, Haibin
    Westerlund, Tomi
    SENSORS, 2020, 20 (14) : 1 - 17
  • [25] AGENT-BASED CLOUD RESOURCE MANAGEMENT FOR SECURE CLOUD INFRASTRUCTURES
    Balogh, Zoltan
    Gatial, Emil
    Hluchy, Ladislav
    COMPUTING AND INFORMATICS, 2014, 33 (06) : 1333 - 1355
  • [26] Reliable and secure data transfer in IoT networks
    Sarada Prasad Gochhayat
    Chhagan Lal
    Lokesh Sharma
    D. P. Sharma
    Deepak Gupta
    Jose Antonio Marmolejo Saucedo
    Utku Kose
    Wireless Networks, 2020, 26 : 5689 - 5702
  • [27] Reliable and secure data transfer in IoT networks
    Gochhayat, Sarada Prasad
    Lal, Chhagan
    Sharma, Lokesh
    Sharma, D. P.
    Gupta, Deepak
    Saucedo, Jose Antonio Marmolejo
    Kose, Utku
    WIRELESS NETWORKS, 2020, 26 (08) : 5689 - 5702
  • [28] Secure and Efficient Control Transfer for IoT Devices
    Wang, Zhi
    Ding, Han
    Han, Jinsong
    Zhao, Jizhong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [29] Secure Low Latency Communication for Constrained Industrial IoT Scenarios
    Hiller, Jens
    Henze, Martin
    Serror, Martin
    Wagner, Eric
    Richter, Jan Niklas
    Wehrle, Klaus
    PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 614 - 622
  • [30] Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices
    Hu, Qiao
    Zhang, Jingyi
    Hancke, Gerhard P.
    Hu, Yupeng
    Li, Wenjia
    Jiang, Hongbo
    Qin, Zheng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 1326 - 1338