Collaborative and verifiable key derivation protocol for smart home security: CV-KDP

Information Technology and Management - Tập 21 - Trang 115-129 - 2019
Sarra Naoui1, Mohamed Elhoucine Elhdhili1, Leila Azouz Saidane1
1Cristal Laboratory, Ecole Nationale des Sciences de l’Informatique (ENSI), Manouba University, Manouba, Tunisia

Tóm tắt

The ciphertext policy is a promising cryptographic technique for smart home data security, and the secrecy of the encryption key purely depends on the security of the key derivation mechanism. In a smart home network, many devices have limited computational and communication resources, and any such mechanism to create a security key should consider these computational and communicational constraints. In this paper, we propose a collaborative and verifiable key derivation protocol based on elliptic curve cryptography for smart home security. Our construction realizes a distributed computation of the security key without adding any extra energy consumption. The proposed collaborative mechanism effectively solves not only the key derivation mechanism security issue, but also adds a verifiability function to avoid keys falsification. Meanwhile, it helps markedly reduce the key derivation overhead at the energy constrained device. A comparison with other collaborative and non collaborative key derivation schemes, demonstrates that our scheme has somewhat better performance in terms of energy overhead at the constrained device side. Also, we provide proof of security of the proposed protocol.

Tài liệu tham khảo

Naoui S, Elhdhili ME, Saidane LA (2019) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J Netw Syst Manag. https://doi.org/10.1007/s10922-019-09496-x Naoui S, Elhdhili ME, Saidane LA (2017) Trusted third party based key management for enhancing LoRaWAN security. In: IEEE/ACS 14th international conference on computer systems and applications (AICCSA). IEEE. https://doi.org/10.1109/AICCSA.2017.73 Mungara R, Venkateswararao K, Pallamreddy V (2011) A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. Int J Comput Technol Appl 2(5):1690–1696 Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE international conference on pervasive computing and communications. IEEE. https://doi.org/10.1109/PERCOM.2005.18 Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International workshop on cryptographic hardware and embedded systems. Springer. https://doi.org/10.1007/978-3-540-28632-5_9 Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: First annual IEEE communications society conference on sensor and ad hoc communications and networks. IEEE SECON. https://doi.org/10.1109/SAHCN.2004.1381904 Yosra BS, Alexis O, Djamal Z, Laurent M (2014) Lightweight collaborative key establishment scheme for the Internet of Things. Comput Netw 64:273–295. https://doi.org/10.1016/j.comnet.2014.02.001 Porambage P, Braeken An, Kumar P, Gurtov A, Ylianttila M (2015) Proxy-based end-to-end key establishment protocol for the Internet of Things. In: IEEE international conference on communication workshop (ICCW). IEEE. https://doi.org/10.1109/ICCW.2015.7247583 Porambage P, An Braeken, Kumar P, Gurtov A, Ylianttila M (2017) CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things. Wirel Pers Commun 96:421–440. https://doi.org/10.1007/s11277-017-4176-5 Naoui S, Elhdhili ME, Saidane LA (2017) Lightweight enhanced collaborative key management scheme for smart home application. In: International conference on high performance computing and simulation (HPCS), 2017. IEEE. https://doi.org/10.1109/HPCS.2017.117 Brachmann M, Keoh S L, Morchon O G, Kumare S S (2012) End-to-end transport security in the IP-based Internet of Things. In: 21st international conference on computer communications and networks (ICCCN). IEEE. https://doi.org/10.1109/ICCCN.2012.6289292 Zhou L, Chao HC (2011) Multimedia traffic security architecture for the Internet of Things. IEEE Netw 25:35–40. https://doi.org/10.1109/MNET.2011.5772059 Kaufman C (2004) Internet key exchange (IKEv2) protocol. https://tools.ietf.org/html/draft-ietf-ipsec-ikev2-17. Accessed 12 Oct 2017 Kaufman C (2011) A TLS/DTLS 1.2 profile for the Internet of Things. https://tools.ietf.org/id/draft-ietf-dice-profile-07.html. Accessed 12 Oct 2017 Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw 32:17–31. https://doi.org/10.1016/j.adhoc.2015.01.006 Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654. https://doi.org/10.1109/TIT.1976.1055638 Hong H, Liu X, Sun Z (2018) A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1102-3 Hong H, Sun Z (2018) Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. World Wide Web 21:595–607. https://doi.org/10.1007/s11280-017-0475-8 Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tools Appl 77:4477–4490. https://doi.org/10.1007/s11042-017-4804-9 Roman R, Alcaraz C, Lopez J, Sklavosb N (2011) Key management systems for sensor networks in the context of the Internet of Things. Comput Electr Eng 37:147–159. https://doi.org/10.1016/j.compeleceng.2011.01.009 Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sens Netw 10:357–430. https://doi.org/10.1155/2014/357430 Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE wireless communications and networking conference (WCNC). IEEE. https://doi.org/10.1109/WCNC.2014.6952860 Chen Y, Luo B (2012) S2a: secure smart household appliances. In: CODASPY ’12 proceedings of the second ACM conference on data and application security and privacy. IEEE. https://doi.org/10.1145/2133601.2133628 Vaidya B, Makrakis D, Mouftah HT (2011) Device authentication mechanism for smart energy home area networks. In: IEEE international conference on consumer electronics (ICCE). IEEE. https://doi.org/10.1109/ICCE.2011.57228648 Han K, Kim J, Shon T, Ko D (2013) A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers Ubiquitous Comput 17:945–949. https://doi.org/10.1007/s00779-012-0541-2 Li Y (2013) Design of a key establishment protocol for smart home energy management system. In: Fifth international conference on computational intelligence, communication systems and networks. IEEE. https://doi.org/10.1109/CICSYN.2013.42 Cremers Cas J F (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer. https://doi.org/10.1007/978-3-540-70545-1_38 Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: 2nd international conference on privacy enhancing technologies. Springer Wei D (2010) Crypto++ library. https://www.cryptopp.com/downloads.html. Accessed 12 Oct 2017