Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2753476.2753477acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Key Management Protocol with Implicit Certificates for IoT systems

Published: 18 May 2015 Publication History

Abstract

This paper proposes a Key Management Protocol for mobile and industrial Internet of Things systems, targeting, at the same time, robust key negotiation, lightweight node authentication, fast re-keying, and efficient protection against replay attacks. The proposed approach pragmatically leverages widely accepted Elliptic Curve Cryptography constructions, specifically the (Elliptic Curve) "Fixed" Diffie Hellman key exchange and the (Elliptic Curve) Qu-Vanstone implicit certificates. Our value added is their suitable integration into a security protocol exchange, designed at layer 2, in the 802.15.4 protocol stack, which permits to i) avoid Elliptic Point multiplications upon rekeying of previously paired devices, and ii) support mutual authentication while securing the protocol exchange. To prove its viability, the proposed Key Management Protocol has been implemented and assessed on severely constrained devices. As expected, but made explicit and quantified by our experimental performance evaluation, the usage of implicit certificates in conjunction with an optimized message exchange yields impressive gains in terms of airtime consumption with respect to state of the art schemes.

References

[1]
ZigBee IP Specification Overview.
[2]
Accettura, N., and Piro, G. Optimal and secure protocols in the IETF 6TiSCH communication stack. In Proc. of Int. Symp. on Industrial Electronics (ISIE) (Jun. 2014), pp. 1469--1474.
[3]
Basu, S., and Pushpalatha, M. Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks. In Proc. of IEEE Int. Conf. on Advanced Networks and Telecommun. Systems (ANTS) (Dec. 2013).
[4]
Bianchi, G., Capossele, A. T., Mei, A., and Petrioli, C. Flexible Key Exchange Negotiation for Wireless Sensor Networks. In Proc. of the ACM Int. Workshop on Wirel. Netw. Testbeds, Experim. Evaluation and Characterization (2010).
[5]
Brown, D. R. L., Gallant, R. P., and Vanstone, S. A. Provably Secure Implicit Certificate Schemes. In Proc. of the Int. Conf. on Financial Cryptography (2002), Springer-Verlag.
[6]
Certicom. Explaining Implicit Certificates. Tech. rep., Certicom, 2004.
[7]
Eldefrawy, M., Khan, M., and Alghathbar, K. A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography. In Proc. of Int. Conf. on Anti-Counterfeiting Security and Identification in Commun. (ASID) (Jul. 2010).
[8]
Eschenauer, L., and Gligor, V. D. A Key-management Scheme for Distributed Sensor Networks. In Proc. of the ACM Conf. on Computer and Commun. Security (2002), ACM.
[9]
Granjal, J., Monteiro, E., and Silva, J. Security for the Internet of Things: A Survey of Existing Protocols and Open Research issues. IEEE Commun. Surveys Tuts. PP, 99 (2015), 1--1.
[10]
Hankerson, D., Vanstone, S., and Menezes, A. Guide to Elliptic Curve Cryptography. Springer, 2004.
[11]
Housley, R., Polk, W., Ford, W., and Solo, D. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, Apr. 2002.
[12]
IEEE. Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), Jun. 2011.
[13]
Jiang, R., Luo, J., and Wang, X. A logic-route key tree based group key management scheme for wireless sensor networks. In Proc. of IEEE Int. Conf. on Commun. in China (ICCC) (Aug. 2013).
[14]
Menezes, A. J., Vanstone, S. A., and Oorschot, P. C. V. Handbook of Applied Cryptography. CRC Press, Inc., 1996.
[15]
Mirzadeh, S., Cruickshank, H., and Tafazolli, R. Secure Device Pairing: A Survey. IEEE Commun. Surveys Tuts. 16, 1 (First 2014).
[16]
Piro, G., Boggia, G., and Grieco, L. A. A Standard Compliant Security Framework for IEEE 802.15.4 Networks. In Proc. of IEEE World Forum on Internet of Things (WF-IoT) (Seoul, South Korea, Mar. 2014).
[17]
Piro, G. and Boggia, G. and Grieco, L.A. Layer-2 security aspects for the IEEE 802.15.4e MAC. IETF 6TiSCH WG, Dec. 2014.
[18]
Ranjan, A. K., Kumar, V., and Hussain, M. Security analysis of TLS authentication. In Proc. of Int. Conf. on Contemporary Computing and Informatics (IC3I) (Nov. 2014).
[19]
Raza, S., Shafagh, H., Hewage, K., Hummen, R., and Voigt, T. Lithe: Lightweight Secure CoAP for the Internet of Things. Sensors Journal, IEEE 13, 10 (2013).
[20]
Richardson, M. 6tisch secure join using 6top. Internet draft, IETF, Nov. 2014.
[21]
Sciancalepore, S., Piro, G., Boggia, G., and Grieco, L. A. Application of IEEE 802.15.4 security procedures in OpenWSN protocol stack. IEEE Standards Education e-Magazine 4 (4th Quarter 2014).
[22]
Sciancalepore, S., Piro, G., Vogli, E., Boggia, G., and Grieco, L. On securing IEEE 802.15.4 networks through a standard compliant framework. In Proc. of IEEE EuroMed Telco Conf. (EMTC) (Naples, IT, November 2014).
[23]
SECG. Sec 2: Recommended elliptic curve domain parameters version 2.0.
[24]
Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini, A. Security, privacy and trust in internet of things: The road ahead. Computer Networks 76 (2015).
[25]
Struik, R. 6TiSCH Security Architectural Elements, Desired Protocol Properties, and Framework. Internet draft, IETF, Oct. 2014.
[26]
Villajosana, X., and Pister, K. Minimal 6TiSCH Configuration,. Internet draft, IETF, Jan. 2015.
[27]
Watteyne, T., Vilajosana, X., Kerkez, B., Chraim, F., Weekly, K., Wank, Q., Glaser, S., and Pister, K. OpenWSN: a standards-based low-power wireless development environment. IEEE Trans. on Emerg. Telecommun. Technol. 23, 5 (2012).

Cited By

View all
  • (2024)Advanced Lightweight Encryption Key Management Algorithms for IoT NetworksBiometrics and Cryptography10.5772/intechopen.112280Online publication date: 19-Jun-2024
  • (2024)Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication ApproachNetwork10.3390/network40200074:2(133-149)Online publication date: 9-Apr-2024
  • (2024)SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social SystemsComputers10.3390/computers1309022513:9(225)Online publication date: 9-Sep-2024
  • Show More Cited By

Index Terms

  1. Key Management Protocol with Implicit Certificates for IoT systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IoT-Sys '15: Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems
    May 2015
    64 pages
    ISBN:9781450335027
    DOI:10.1145/2753476
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 May 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ecc
    2. ecqv
    3. experimental assessment
    4. iot
    5. key negotiation
    6. security

    Qualifiers

    • Research-article

    Conference

    MobiSys'15
    Sponsor:

    Acceptance Rates

    IoT-Sys '15 Paper Acceptance Rate 9 of 18 submissions, 50%;
    Overall Acceptance Rate 9 of 18 submissions, 50%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)48
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Advanced Lightweight Encryption Key Management Algorithms for IoT NetworksBiometrics and Cryptography10.5772/intechopen.112280Online publication date: 19-Jun-2024
    • (2024)Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication ApproachNetwork10.3390/network40200074:2(133-149)Online publication date: 9-Apr-2024
    • (2024)SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social SystemsComputers10.3390/computers1309022513:9(225)Online publication date: 9-Sep-2024
    • (2024)A Development of 5G Technology in Cloud Computing and its Optimization Technique2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE60783.2024.10617049(372-377)Online publication date: 14-May-2024
    • (2024)BEKMP: A Blockchain-Enabled Key Management Protocol for Underwater Acoustic Sensor NetworksIEEE Access10.1109/ACCESS.2024.340589012(74108-74125)Online publication date: 2024
    • (2024)An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenarioJournal of Network and Computer Applications10.1016/j.jnca.2024.104025232(104025)Online publication date: Dec-2024
    • (2024)Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of ThingsArabian Journal for Science and Engineering10.1007/s13369-024-08884-z49:9(12919-12934)Online publication date: 22-Mar-2024
    • (2024)Hierarchical Heterogeneous Ant Colony Optimization-Based Approach to Generate Efficient Minimal Boolean Expressions for Rekeying in Authentication of IoT DevicesApplications of Ant Colony Optimization and its Variants10.1007/978-981-99-7227-2_9(171-187)Online publication date: 16-Feb-2024
    • (2023)BTAA: Blockchain and TEE-Assisted Authentication for IoT SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.325256510:14(12603-12615)Online publication date: 15-Jul-2023
    • (2023)Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2022.322967610:9(7761-7773)Online publication date: 1-May-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media