Lightweight collaborative key establishment scheme for the Internet of Things
Tóm tắt
Từ khóa
Tài liệu tham khảo
Lewis, 2004, Wireless sensor networks
Geng, 2011, M2M: from mobile to embedded internet, IEEE Commun. Mag., 49, 36, 10.1109/MCOM.2011.5741144
C. Wietfeld, H. Georg, S. Groening, C. Lewandowski, C. Mueller, J. Schmutzler, Wireless M2M communication networks for smart grid applications, in: Wireless Conference 2011 – Sustainable Wireless Technologies (European Wireless), April 2011.
Zhang, 2011, Home M2M networks: architectures, standards, and QoS improvement, IEEE Commun. Mag., 49, 44, 10.1109/MCOM.2011.5741145
Menezes, 1996
Diffie, 1976, New directions in cryptography, IEEE Trans. Inform. Theory, 22, 644, 10.1109/TIT.1976.1055638
V. Manral, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH), IETF RFC 4835, April 2007.
J. Arkko, E. Carrara, F. Lindholm, M. Naslund, K. Norrman, MIKEY: Multimedia Internet KEYing, IETF RFC 3830, August 2004.
P. Eronen, H. Tschofenig, Pre-shared Key Ciphersuites for Transport Layer Security (TLS), IETF RFC 4279, December 2005.
T. Dierks, E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, August 2008.
R. Moskowitz, Host Identity Protocol Architecture, draft-ietf-hip-rfc4423-bis-03 (IETF Work in Progress), September 2011.
V. Cakulev, G. Sundarm, I. Broustis, IBAKE: Identity-based Authenticated Key Exchange, IETF RFC 6539, March 2012.
Chan, 2004, Key distribution techniques for sensor networks, 277
D. Liu, P. Ning, Location-based pairwise key establishments for static sensor networks, in: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (CCS ’03), October 2003, pp. 72–82.
W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM’04. 2004.
S. Schmidt, H. Krahn, S. Fischer, D. Watjen, A security architecture for mobile wireless sensor networks, in: Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS’04) (Heidelberg, Germany), vol. 3313, August 2004.
Potlapally, 2006, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Trans. Mobile Comput., 128, 10.1109/TMC.2006.16
V. Gupta, M. Millard, S. Fung, Yu Zhu, N. Gura, H. Eberle, S. Chang Shantz, Sizzle: a standards-based end-to-end security architecture for the embedded internet, in: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, March 08–12, 2005, pp. 247–256.
ANSI X9.62, Elliptic Curve Key Agreement and Key Transport Protocols, American Bankers Association, 1999.
ANSI X9.63, The Elliptic Curve Digital Signature Algorithm, American Bankers Association, 1999.
W. Jung et al., SSL-based lightweight security of IP-based wireless sensor networks, in: International Conference on Advanced Information Networking and Applications Workshop, 2009.
V. Nagalakshmi, I. Rameshbabu, P.S. Avadhani, Modified protocols for internet key exchange (IKE) using public encryption key and signature keys, in: Proc. of the Eighth International Conference on Information Technology: New Generations, 2011, pp. 376–381.
R. Sangram, G.P. Biswas, Establishment of ECC-based initial secrecy usable for IKE implementation, in: Lecture Notes in Engineering and Computer, Science, 2012, pp. 530–535.
A. Liu, P. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, Technical Report TR-2007-36, North Carolina State University, Department of Computer, Science, 2007.
Atzori, 2010
R. Merkle, Secrecy, Authentication, and Public Key Systems, Ph.D. Dissertation, Dept. of Electrical Engineering, Stanford Univ., 1979.
N. Fazio, A. Nicolosi, Cryptographic accumulators: definitions, constructions and applications, in: Technical Report, 2002.
L. Lamport, Constructing digital signatures from one-way function, in: Technical Report SRI-CLS-98, SRI international, October 1979.
S. Seys, B. Preneel, Power consumption evaluation of efficient digital signature schemes for low power devices, in: Proceedings of the 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE WiMob 2005), 2005, pp. 79–86.
A. Brusilovsky, I. Faynberg, Z. Zeltsan, Password-Authenticated Key (PAK) Diffie–Hellman Exchange, RFC 5683, February 2010.
W. Dai, Crypto++ Library 5.6.0. <http://www.cryptopp.com>.
J. Lacan, V. Roca, J. Peltotalo, Reed–Solomon Forward Error Correction (FEC) Schemes, IETF RFC 5510, April 2009.
IT++ Library. <http://itpp.sourceforge.net/current/>.
A. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: Third IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324–328.
G. De Meulenaer, F. Gosset, F.-X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008), 2008.
Paek, 2005