Repository logo
  • Log In
    New user? Click here to register.Have you forgotten your password?
University College Dublin
  • Colleges & Schools
  • Statistics
  • All of DSpace
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. College of Science
  3. School of Computer Science
  4. Computer Science Research Collection
  5. Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
 
  • Details
Options

Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)

File(s)
FileDescriptionSizeFormat
Download Anonymous_Lightweight_Proxy_Based_Key_Agreement_for_IoT__ALPKA_ (3).pdf1.31 MB
Author(s)
Braeken, An 
Liyanage, Madhusanka 
Jurcut, Anca Delia 
Uri
http://hdl.handle.net/10197/11172
Date Issued
May 2019
Date Available
23T15:39:49Z October 2019
Abstract
The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing in terms of size, weight, functionality, and resource capabilities. The main challenge is to establish the required security features in the most constrained devices, even if they are unknown to each other and do not share common pre-distributed key material. As a consequence, there is a high need for scalable and lightweight key establishment protocols. In this paper, we propose a key agreement protocol between two IoT devices without prior trust relation, using solely symmetric key based operations, by relying on a server or proxy based approach. This proxy is responsible for the verification of the authentication and the key agreement between the IoT devices, without being capable of deriving the established session key. We propose two versions. The first version does not require interactive input from the key distribution center to the proxy, but is not resistant if a compromised user and proxy are collaborating. The second version on the other hand is collision resistant, but needs an interactive key distribution center. In addition, we add the interesting features of anonymity and unlinkability of the sender and receiver in both protocol versions. The security properties of the proposed protocol are verified by using formal verification techniques.
Sponsorship
European Commission Horizon 2020
Other Sponsorship
COST Action
Type of Material
Journal Article
Publisher
Springer
Journal
Wireless Personal Communications
Volume
106
Issue
2
Start Page
345
End Page
364
Copyright (Published Version)
2019 Springer
Keywords
  • Internet of Things

  • Authentication

  • Key establishment

  • Proxy

  • Resource-constrained ...

  • Anonymity

  • Formal verification

DOI
10.1007/s11277-019-06165-9
Language
English
Status of Item
Peer reviewed
ISSN
0929-6212
This item is made available under a Creative Commons License
https://creativecommons.org/licenses/by-nc-nd/3.0/ie/
Owning collection
Computer Science Research Collection
Scopus© citations
11
Acquisition Date
Feb 5, 2023
View Details
Views
760
Acquisition Date
Feb 5, 2023
View Details
Downloads
360
Last Week
2
Last Month
10
Acquisition Date
Feb 5, 2023
View Details
google-scholar
University College Dublin Research Repository UCD
The Library, University College Dublin, Belfield, Dublin 4
Phone: +353 (0)1 716 7583
Fax: +353 (0)1 283 7667
Email: mailto:research.repository@ucd.ie
Guide: http://libguides.ucd.ie/rru

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement