DocumentCode :
2120093
Title :
Proxy-based end-to-end key establishment protocol for the Internet of Things
Author :
Porambage, Pawani ; Braeken, An ; Kumar, Pardeep ; Gurtov, Andrei ; Ylianttila, Mika
Author_Institution :
Centre for Wireless Communications, University of Oulu, P.o.Box 4500, FI-90014, Finland
fYear :
2015
fDate :
8-12 June 2015
Firstpage :
2677
Lastpage :
2682
Abstract :
The Internet of Things (IoT) drives the world towards an always connected paradigm by interconnecting wide ranges of network devices irrespective of their resource capabilities and local networks. This would inevitably enhance the requirements of constructing dynamic and secure end-to-end (E2E)connections among the heterogenous network devices with imbalanced resource profiles and less or no previous knowledge about each other. The device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. We propose a proxy-based key establishment protocol for the IoT, which enables any two unknown high resource constrained devices to initiate secure E2E communication. The high constrained devices should be legitimate and maintain secured connections with the neighbouring less constrained devices in the local networks, in which they are deployed. The less constrained devices are performing as the proxies and collaboratively advocate the expensive cryptographic operations during the session key computation. Finally, we demonstrate the applicability of our solution in constrained IoT devices by providing performance and security analysis.
Keywords :
Conferences; Cryptography; DH-HEMTs; Internet of things; Polynomials; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Workshop (ICCW), 2015 IEEE International Conference on
Conference_Location :
London, United Kingdom
Type :
conf
DOI :
10.1109/ICCW.2015.7247583
Filename :
7247583
Link To Document :
بازگشت