Lightweight collaborative key establishment scheme for the Internet of Things

Computer Networks - Tập 64 - Trang 273-295 - 2014
Yosra Ben Saied1,2,3,4, Alexis Olivereau2, Djamal Zeghlache1,3,4, Maryline Laurent1,3,5
1CNRS - Centre National de la Recherche Scientifique (France)
2LIST (CEA) - Laboratoire d'Intégration des Systèmes et des Technologies (DRT/LIST Nano-INNOV Avenue de la Vauve 91120 Palaiseau - France)
3SAMOVAR - Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Télécom Sudparis, 9 rue Charles Fourier -91011 Evry cedex - France)
4TSP - RS2M - Département Réseaux et Services Multimédia Mobiles (Télécom SudParis - 9 rue Charles Fourier - 91011 Évry cedex - France)
5TSP - RST - Département Réseaux et Services de Télécommunications (Télécom SudParis - 9 rue Charles Fourier - 91011 Évry cedex - France)

Tóm tắt

Từ khóa


Tài liệu tham khảo

Lewis, 2004, Wireless sensor networks

Geng, 2011, M2M: from mobile to embedded internet, IEEE Commun. Mag., 49, 36, 10.1109/MCOM.2011.5741144

C. Wietfeld, H. Georg, S. Groening, C. Lewandowski, C. Mueller, J. Schmutzler, Wireless M2M communication networks for smart grid applications, in: Wireless Conference 2011 – Sustainable Wireless Technologies (European Wireless), April 2011.

Zhang, 2011, Home M2M networks: architectures, standards, and QoS improvement, IEEE Commun. Mag., 49, 44, 10.1109/MCOM.2011.5741145

Menezes, 1996

Diffie, 1976, New directions in cryptography, IEEE Trans. Inform. Theory, 22, 644, 10.1109/TIT.1976.1055638

V. Manral, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH), IETF RFC 4835, April 2007.

J. Arkko, E. Carrara, F. Lindholm, M. Naslund, K. Norrman, MIKEY: Multimedia Internet KEYing, IETF RFC 3830, August 2004.

P. Eronen, H. Tschofenig, Pre-shared Key Ciphersuites for Transport Layer Security (TLS), IETF RFC 4279, December 2005.

T. Dierks, E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, August 2008.

C. Kaufman, Internet Key Exchange (IKEv2) Protocol, IETF RFC 4306, December 2005.

R. Moskowitz, Host Identity Protocol Architecture, draft-ietf-hip-rfc4423-bis-03 (IETF Work in Progress), September 2011.

V. Cakulev, G. Sundarm, I. Broustis, IBAKE: Identity-based Authenticated Key Exchange, IETF RFC 6539, March 2012.

Chan, 2004, Key distribution techniques for sensor networks, 277

D. Liu, P. Ning, Location-based pairwise key establishments for static sensor networks, in: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (CCS ’03), October 2003, pp. 72–82.

W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM’04. 2004.

S. Schmidt, H. Krahn, S. Fischer, D. Watjen, A security architecture for mobile wireless sensor networks, in: Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS’04) (Heidelberg, Germany), vol. 3313, August 2004.

Potlapally, 2006, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Trans. Mobile Comput., 128, 10.1109/TMC.2006.16

V. Gupta, M. Millard, S. Fung, Yu Zhu, N. Gura, H. Eberle, S. Chang Shantz, Sizzle: a standards-based end-to-end security architecture for the embedded internet, in: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, March 08–12, 2005, pp. 247–256.

ANSI X9.62, Elliptic Curve Key Agreement and Key Transport Protocols, American Bankers Association, 1999.

ANSI X9.63, The Elliptic Curve Digital Signature Algorithm, American Bankers Association, 1999.

W. Jung et al., SSL-based lightweight security of IP-based wireless sensor networks, in: International Conference on Advanced Information Networking and Applications Workshop, 2009.

V. Nagalakshmi, I. Rameshbabu, P.S. Avadhani, Modified protocols for internet key exchange (IKE) using public encryption key and signature keys, in: Proc. of the Eighth International Conference on Information Technology: New Generations, 2011, pp. 376–381.

R. Sangram, G.P. Biswas, Establishment of ECC-based initial secrecy usable for IKE implementation, in: Lecture Notes in Engineering and Computer, Science, 2012, pp. 530–535.

A. Liu, P. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, Technical Report TR-2007-36, North Carolina State University, Department of Computer, Science, 2007.

Atzori, 2010

R. Merkle, Secrecy, Authentication, and Public Key Systems, Ph.D. Dissertation, Dept. of Electrical Engineering, Stanford Univ., 1979.

N. Fazio, A. Nicolosi, Cryptographic accumulators: definitions, constructions and applications, in: Technical Report, 2002.

L. Lamport, Constructing digital signatures from one-way function, in: Technical Report SRI-CLS-98, SRI international, October 1979.

S. Seys, B. Preneel, Power consumption evaluation of efficient digital signature schemes for low power devices, in: Proceedings of the 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE WiMob 2005), 2005, pp. 79–86.

M. Watson, Basic Forward Error Correction (FEC) Scheme, RFC 5445, March 2009.

A. Brusilovsky, I. Faynberg, Z. Zeltsan, Password-Authenticated Key (PAK) Diffie–Hellman Exchange, RFC 5683, February 2010.

Shamir, 1979, How to share a secret, Commun. ACM, 22, 612, 10.1145/359168.359176

W. Dai, Crypto++ Library 5.6.0. <http://www.cryptopp.com>.

J. Lacan, V. Roca, J. Peltotalo, Reed–Solomon Forward Error Correction (FEC) Schemes, IETF RFC 5510, April 2009.

IT++ Library. <http://itpp.sourceforge.net/current/>.

A. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: Third IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324–328.

G. De Meulenaer, F. Gosset, F.-X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008), 2008.

Paek, 2005

C. Merlin, W. Heinzelman, Duty cycle control for low-power-listening mac protocols, in: MASS, 2008.