Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

被引:25
作者
Markmann, Tobias [1 ]
Schmidt, Thomas C. [1 ]
Waehlisch, Matthias [2 ]
机构
[1] HAW Hamburg, Hamburg, Germany
[2] Free Univ Berlin, Berlin, Germany
来源
SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION | 2015年
关键词
Smart objects; ID-based cryptography; end-to-end security; authentication; federation;
D O I
10.1145/2785956.2790021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identity based cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deployment friendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). Our early results demonstrate feasibility and promise efficiency after ongoing optimisations.
引用
收藏
页码:603 / 604
页数:2
相关论文
共 5 条
[1]  
Baccelli E., 2013, P INFOCOM
[2]  
Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207
[3]  
Cao X., 2008, COMP COMM, V31
[4]   DTLS based security and two-way authentication for the Internet of Things [J].
Kothmayr, Thomas ;
Schmitt, Corinna ;
Hu, Wen ;
Bruenig, Michael ;
Carle, Georg .
AD HOC NETWORKS, 2013, 11 (08) :2710-2723
[5]  
Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]