Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
Files in This Item:
|Anonymous_Lightweight_Proxy_Based_Key_Agreement_for_IoT__ALPKA_ (3).pdf||1.34 MB||Adobe PDF||Download|
|Title:||Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)||Authors:||Braeken, An; Liyanage, Madhusanka; Jurcut, Anca Delia||Permanent link:||http://hdl.handle.net/10197/11172||Date:||May-2019||Online since:||2019-10-23T15:39:49Z||Abstract:||The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing in terms of size, weight, functionality, and resource capabilities. The main challenge is to establish the required security features in the most constrained devices, even if they are unknown to each other and do not share common pre-distributed key material. As a consequence, there is a high need for scalable and lightweight key establishment protocols. In this paper, we propose a key agreement protocol between two IoT devices without prior trust relation, using solely symmetric key based operations, by relying on a server or proxy based approach. This proxy is responsible for the verification of the authentication and the key agreement between the IoT devices, without being capable of deriving the established session key. We propose two versions. The first version does not require interactive input from the key distribution center to the proxy, but is not resistant if a compromised user and proxy are collaborating. The second version on the other hand is collision resistant, but needs an interactive key distribution center. In addition, we add the interesting features of anonymity and unlinkability of the sender and receiver in both protocol versions. The security properties of the proposed protocol are verified by using formal verification techniques.||Funding Details:||European Commission Horizon 2020||metadata.dc.description.othersponsorship:||COST Action||Type of material:||Journal Article||Publisher:||Springer||Journal:||Wireless Personal Communications||Volume:||106||Issue:||2||Start page:||345||End page:||364||Copyright (published version):||2019 Springer||Keywords:||Internet of Things; Authentication; Key establishment; Proxy; Resource-constrained devices; Anonymity; Formal verification||DOI:||10.1007/s11277-019-06165-9||Language:||en||Status of Item:||Peer reviewed|
|Appears in Collections:||Computer Science Research Collection|
Show full item record
This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.