Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)

Files in This Item:
File Description SizeFormat 
Anonymous_Lightweight_Proxy_Based_Key_Agreement_for_IoT__ALPKA_ (3).pdf1.34 MBAdobe PDFDownload
Title: Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
Authors: Braeken, AnLiyanage, MadhusankaJurcut, Anca Delia
Permanent link:
Date: May-2019
Online since: 2019-10-23T15:39:49Z
Abstract: The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing in terms of size, weight, functionality, and resource capabilities. The main challenge is to establish the required security features in the most constrained devices, even if they are unknown to each other and do not share common pre-distributed key material. As a consequence, there is a high need for scalable and lightweight key establishment protocols. In this paper, we propose a key agreement protocol between two IoT devices without prior trust relation, using solely symmetric key based operations, by relying on a server or proxy based approach. This proxy is responsible for the verification of the authentication and the key agreement between the IoT devices, without being capable of deriving the established session key. We propose two versions. The first version does not require interactive input from the key distribution center to the proxy, but is not resistant if a compromised user and proxy are collaborating. The second version on the other hand is collision resistant, but needs an interactive key distribution center. In addition, we add the interesting features of anonymity and unlinkability of the sender and receiver in both protocol versions. The security properties of the proposed protocol are verified by using formal verification techniques.
Funding Details: European Commission Horizon 2020
metadata.dc.description.othersponsorship: COST Action
Type of material: Journal Article
Publisher: Springer
Journal: Wireless Personal Communications
Volume: 106
Issue: 2
Start page: 345
End page: 364
Copyright (published version): 2019 Springer
Keywords: Internet of ThingsAuthenticationKey establishmentProxyResource-constrained devicesAnonymityFormal verification
DOI: 10.1007/s11277-019-06165-9
Language: en
Status of Item: Peer reviewed
Appears in Collections:Computer Science Research Collection

Show full item record

Citations 50

Last Week
Last month
checked on Nov 30, 2019

Page view(s)

Last Week
Last month
checked on Dec 5, 2019


checked on Dec 5, 2019

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.