A Handshake Protocol With Unbalanced Cost for Wireless Updating

被引:8
|
作者
Cai, Jiaren [1 ]
Huang, Xin [1 ]
Zhang, Jie [1 ]
Zhao, Jiawei [2 ]
Lei, Yaxi [1 ]
Liu, Dawei [1 ]
Ma, Xiaofeng [3 ]
机构
[1] Xian Jiaotong Liverpool Univ, Dept Comp Sci & Software Engn, Suzhou 215123, Peoples R China
[2] Xian Jiaotong Liverpool Univ, Int Business Sch Suzhou, Suzhou 215123, Peoples R China
[3] Tongji Univ, Dept Control Sci & Engn, Shanghai 200092, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
美国国家科学基金会;
关键词
Internet of Things; wireless updating; secure sockets layer; transport layer security; software defined function; unbalanced OpenFunction handshake; INTERNET; THINGS;
D O I
10.1109/ACCESS.2018.2820086
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless updating is an essential method to update system files or fix bugs in Internet of Things (IoT) devices. A significant and challenging problem in wireless updating is security. First, without security guarantees, attackers can utilize the updating procedure to install harmful programs into the victim devices. Second, it is challenging to provide security for wireless updating, since in many IoT scenarios, the devices to be updated are computationally limited devices and located far from the center that issues update files. Currently, there are two types of solution to protect the wireless updating. The first one is the transport layer security (TLS) protocol or secure sockets layer (SSL) protocol that are used by wireless updating schemes for mobile terminals with the following operation systems: Windows, Debian, Android, and iOS. Another solution is the elliptic curve Diffie-Hellman (ECDH)-based handshake in the software-defined function (SDF) wireless updating scheme for the IoT devices. However, both the two solutions require equal computation tasks on the update file issuing center and the device to be updated. Normally, the former is much powerful than the latter. Therefore, to further address the security problem in wireless updating, we propose a novel solution with unbalanced computation costs on the two parties. In particular, we design an improved ECDH-based handshake protocol for the SDF wireless updating scheme, namely, the unbalanced OpenFunction handshake protocol. The protocol transfers significant computation task from the limited IoT device to the powerful center. The security of the protocol is analyzed. A prototype is realized to test the performance of the protocol. The experiment results show that in the same experimental platform, our protocol is much lightweight than the TLS handshake protocol and SSL handshake protocol.
引用
收藏
页码:18570 / 18581
页数:12
相关论文
共 50 条
  • [1] An Improved TLS handshake protocol
    Li Xian-Zhu
    Liu Jun
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 130 - 136
  • [2] Two-way Handshake protocol for improved security in IEEE 802.11 wireless LANs
    Park, Chang-Seop
    [J]. COMPUTER COMMUNICATIONS, 2010, 33 (09) : 1133 - 1140
  • [3] Improvement of integrated services on CDMA wireless LANs using the handshake-ALOHA protocol
    Jiang, S
    [J]. ELECTRONICS LETTERS, 1996, 32 (01) : 12 - 14
  • [4] Improvement of integrated services on CDMA wireless LANs using the handshake-Aloha protocol
    Natl Yunlin Inst of Technology, Yunlin County, Taiwan
    [J]. Electron Lett, 1 (12-14):
  • [5] Extending the TLS Protocol by EAP Handshake to Build a Security Architecture for Heterogenous Wireless Network
    Grochla, Krzysztof
    Stolarz, Piotr
    [J]. COMPUTER NETWORKS, CN 2013, 2013, 370 : 258 - 267
  • [6] The TLS Handshake Protocol: A Modular Analysis
    Morrissey, P.
    Smart, N. P.
    Warinschi, B.
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (02) : 187 - 223
  • [7] Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Shih, Tzay-Farn
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 827 - 832
  • [8] A CSK BASED SSL HANDSHAKE PROTOCOL
    Du, Liping
    Hu, Xiangyi
    Li, Ying
    Zhao, Guifen
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 600 - 603
  • [9] The TLS Handshake Protocol: A Modular Analysis
    P. Morrissey
    N. P. Smart
    B. Warinschi
    [J]. Journal of Cryptology, 2010, 23 : 187 - 223
  • [10] Security enhanced WTLS handshake protocol
    Kwak, J
    Han, J
    Oh, S
    Won, D
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 3, 2004, 3045 : 955 - 964