Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

被引:3
|
作者
Markmann, Tobias [1 ]
Schmidt, Thomas C. [1 ]
Waehlisch, Matthias [2 ]
机构
[1] HAW Hamburg, Hamburg, Germany
[2] Free Univ Berlin, Berlin, Germany
关键词
Smart objects; ID-based cryptography; end-to-end security; authentication; federation;
D O I
10.1145/2829988.2790021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identity based cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deployment friendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). Our early results demonstrate feasibility and promise efficiency after ongoing optimisations.
引用
收藏
页码:603 / 604
页数:2
相关论文
共 50 条
  • [1] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [2] End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
    Gao, Yansong
    Kim, Minki
    Abuadbba, Sharif
    Kim, Yeonjae
    Thapa, Chandra
    Kim, Kyuyeon
    Camtep, Seyit A.
    Kim, Hyoungshick
    Nepal, Surya
    [J]. 2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 91 - 100
  • [3] Lightweight Internet of Things Device Authentication, Encryption, and Key Distribution Using End-to-End Neural Cryptosystems
    Sun, Yingnan
    Lo, Frank P-W
    Lo, Benny
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14978 - 14987
  • [4] A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    [J]. PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [5] An End-to-End Reliability Framework of the Internet of Things
    Azghiou, Kamal
    El Mouhib, Manal
    Koulali, Mohammed-Amine
    Benali, Abdelhamid
    [J]. SENSORS, 2020, 20 (09)
  • [6] Internet of Things: An End-to-End Security Layer
    Behrens, Reinhard
    Ahmed, Ali
    [J]. PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
  • [7] A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication
    Kothmayr, Thomas
    Schmitt, Corinna
    Hu, Wen
    Bruenig, Michael
    Carle, Georg
    [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 956 - 963
  • [8] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP
    Buschsieweke, Marian
    Guenes, Mesut
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [9] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [10] End-to-end secure group communication for the Internet of Things
    Lizardo, Andre
    Barbosa, Raul
    Neves, Samuel
    Correia, Jaime
    Araujo, Filipe
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58