DocumentCode :
1772739
Title :
Proxied IBE-based key establishment for LLNs
Author :
Papanikolaou, A. ; Rantos, Konstantinos ; Androulidakis, I.
Author_Institution :
Dept. of Electron. & Comput. Eng., Tech. Univ. of Crete, Chania, Greece
fYear :
2014
fDate :
9-11 July 2014
Firstpage :
275
Lastpage :
280
Abstract :
Embedded systems devices have a wide application range, an instance of which is their use in Low-power and Lossy Networks (LLNs), which are anticipated to become one of the fundamental building blocks for the realisation of the Internet of Things (IoT). The security issues emerging from the requirement for Web accessibility can be fulfilled by appropriate cryptographic techniques, so as to secure the communicated information, supported by appropriate key exchange protocols, able to cope with the particular nature of such networks. The properties of Identity-Based Encryption (IBE) seem to match well the nature of such networks, thus an IBE-based key establishment protocol would be a good choice to be used in an LLN. However, severe limitations on those devices resources render deployment of expensive key establishment protocols inappropriate. Alternatives are therefore proposed such as offloading some of the computationally-intensive tasks to other, more powerful devices. Our IBE-based key establishment protocol enables a constrained node to exchange a shared secret with a remote party, that typically operates outside the node´s network through an also non-constrained proxy node that undertakes the task of performing some of the expensive computations. The proposed key establishment scheme facilitates secure communications among embedded systems devices providing information and services to remote parties, towards the realisation of the Internet of Things.
Keywords :
Internet of Things; cryptographic protocols; embedded systems; IBE-based key establishment protocol; Internet of Things; IoT; LLN; embedded systems devices; identity-based encryption; key exchange protocols; low-power and lossy networks; nonconstrained proxy node; proxied IBE-based key establishment; secure communications; Elliptic curve cryptography; Identity-based encryption; Peer-to-peer computing; Protocols; embedded systems; identity-based encryption; key establishment; low-power and lossy networks; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Digital Technologies (DT), 2014 10th International Conference on
Conference_Location :
Zilina
Type :
conf
DOI :
10.1109/DT.2014.6868727
Filename :
6868727
Link To Document :
بازگشت