skip to main content
10.1145/2785956.2790021acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Free Access

Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

Published:17 August 2015Publication History

ABSTRACT

Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identity-based cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deployment-friendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). Our early results demonstrate feasibility and promise efficiency after ongoing optimizations.

References

  1. A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Advances in Cryptology -- CRYPTO 1984, LNCS Springer, Aug. 1985, vol. 196, pp. 47--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things," Ad Hoc Networks, vol. 11, no. 8, pp. 2710--2723, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. J. Bernstein, "Curve25519: New Diffie-Hellman Speed Records," in Public Key Cryptography - PKC 2006, LNCS Springer, 2006, vol. 3958, pp. 207--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. X. Cao, W. Kou, L. Dang, and B. Zhao, "IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks," Comp. Comm., 31 (4), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Baccelli, O. Hahm, M. Günes, M. Wahlisch, and T. C. Schmidt, "RIOT OS: Towards an OS for the Internet of Things," in Proc. of INFOCOM, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGCOMM '15: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication
          August 2015
          684 pages
          ISBN:9781450335423
          DOI:10.1145/2785956

          Copyright © 2015 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 August 2015

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          SIGCOMM '15 Paper Acceptance Rate40of242submissions,17%Overall Acceptance Rate554of3,547submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader