Secure Ownership Transfer for Resource Constrained IoT Infrastructures

被引:0
|
作者
Gunnarsson, Martin [1 ]
Gehrmann, Christian [2 ]
机构
[1] RISE, Ole Romers Vag 5A, Lund, Sweden
[2] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
基金
欧盟地平线“2020”;
关键词
IoT; Ownership transfer; Constrained devices; E-HEALTH SYSTEMS; TRANSFER PROTOCOL; TAG OWNERSHIP; INTERNET; KEY; AUTHENTICATION; SCHEME; THINGS;
D O I
10.1007/978-3-030-94900-6_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol's resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. The results presented in this paper, an extend version of previously published work on secure ownership transfer protocols for constrained IoT devices by the same authors.
引用
收藏
页码:22 / 47
页数:26
相关论文
共 50 条
  • [41] Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures
    Perez, Salvador
    Garcia-Carrillo, Dan
    Marin-Lopez, Rafael
    Hernandez-Ramos, Jose L.
    Marin-Perez, Rafael
    Skarmeta, Antonio F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 570 - 585
  • [42] A Decentralized Resource Allocation in Edge Computing for Secure IoT Environments
    Sasikumar, A.
    Ravi, Logesh
    Devarajan, Malathi
    Vairavasundaram, Subramaniyaswamy
    Selvalakshmi, A.
    Kotecha, Ketan
    Abraham, Ajith
    IEEE ACCESS, 2023, 11 : 117177 - 117189
  • [43] Secure Applications without Secure Infrastructures
    Gollmann, Dietei
    COMPUTER NETWORK SECURITY, 2010, 6258 : 21 - 31
  • [44] A Secure Communication System for Constrained IoT Devices-Experiences and Recommendations
    Goworko, Michal
    Wytrebowicz, Jacek
    SENSORS, 2021, 21 (20)
  • [45] IoT Enabled API for Secure Transfer of Medical Data
    Sonune, Suvarnamala
    Kalbande, Dhananjay
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [46] Secure Mobile RFID Ownership Transfer Protocol to Cover all Transfer Scenarios
    Ray, Biplob R.
    Chowdhury, Morshed
    Abawajy, Jemal
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1185 - 1192
  • [47] STEM : Secure transfer of encrypted message in IoT networks
    Sonam
    Johari, Rahul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1425 - 1434
  • [48] Universal and secure object ownership transfer protocol for the Internet of Things
    Ray, Biplob R.
    Abawajy, Jemal
    Chowdhury, Morshed
    Alelaiwi, Abdulhameed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 838 - 849
  • [49] SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
    Li, Jianwei
    Wang, Xiaoming
    Gan, Qingqing
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (05)
  • [50] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24