ABSTRACT
Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identity-based cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deployment-friendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). Our early results demonstrate feasibility and promise efficiency after ongoing optimizations.
- A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Advances in Cryptology -- CRYPTO 1984, LNCS Springer, Aug. 1985, vol. 196, pp. 47--53. Google ScholarDigital Library
- T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things," Ad Hoc Networks, vol. 11, no. 8, pp. 2710--2723, 2013. Google ScholarDigital Library
- D. J. Bernstein, "Curve25519: New Diffie-Hellman Speed Records," in Public Key Cryptography - PKC 2006, LNCS Springer, 2006, vol. 3958, pp. 207--228. Google ScholarDigital Library
- X. Cao, W. Kou, L. Dang, and B. Zhao, "IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks," Comp. Comm., 31 (4), 2008. Google ScholarDigital Library
- E. Baccelli, O. Hahm, M. Günes, M. Wahlisch, and T. C. Schmidt, "RIOT OS: Towards an OS for the Internet of Things," in Proc. of INFOCOM, 2013.Google Scholar
Index Terms
- Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
Recommendations
Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
SIGCOMM'15Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identity-based cryptography (IBC), we propose an efficient end-to-end authentication ...
Secure IoT framework and 2D architecture for End-To-End security
In this paper, we proposed an secure IoT framework to ensure an End-To-End security from an IoT application to IoT devices. The proposed IoT framework consists of the IoT application, an IoT broker and the IoT devices. The IoT devices can be deployed ...
ID-Based Non-interactive Deniable Authentication Protocol
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver’s private and some other public values. ...
Comments