Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY

被引:6
作者
Kim Thuat Nguyen [1 ]
Oualha, Nouha [1 ]
Laurent, Maryline [2 ]
机构
[1] CEA, LIST, Commun Syst Lab, F-91191 Gif Sur Yvette, France
[2] Telecom SudParis, Inst Mines Telecom, UMR CNRS SAMOVAR 5157, 9 Rue Charles Fourier, F-91011 Evry, France
来源
INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016 | 2016年 / 9895卷
关键词
D O I
10.1007/978-3-319-45931-8_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications. As MIKEY becomes widely deployed, it becomes worthwhile to not confine its applications to real-time or other specific applications, but also to extend the standard to other scenarios as well. For instance, MIKEY can be used to secure key establishment in the Internet of Things. In this particular context, Elliptic Curve Cryptography-based (ECC) algorithms seem to be good candidate to be employed by MIKEY, since they can support equivalent security level when compared with other recommended cryptographic algorithms like RSA, and at the same time requiring smaller key sizes and offering better performance. In this work, we propose novel lightweight ECC-based key distribution extensions for MIKEY that are built upon a previously proposed certificateless signcryption scheme. To our knowledge, these extensions are the first ECC-based MIKEY extensions that employ signcryption schemes. Our proposed extensions benefit from the lightness of the signcryption scheme, while being discharged from the burden of the public key infrastructure (PKI) thanks to its certificateless feature. To demonstrate their performance, we implemented our proposed extensions in the Openmote sensor platform and conducted a thorough performance assessment by measuring the energy consumption and execution time of each operation in the key establishment procedure. The experimental results prove that our new MIKEY extensions are perfectly suited for resource-constrained devices.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 24 条
[1]   An end-to-end secure key management protocol for e-health applications [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 :184-197
[2]  
Arkko J., 2004, 3830 RFC INT ENG
[3]   Server Assisted Key Establishment Protocol for WSN: a MIKEY-Ticket approach [J].
Boudguiga, Aymen ;
Olivereau, Alexis ;
Oualha, Nouha .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :94-101
[4]  
Brown D., 2009, Released Standard Version 1
[5]  
Brown D. R. L., 2010, SEC 2: Recommended Elliptic Curve Domain Parameters
[6]  
Brown D. R. L., 2007, IN PRESS
[7]  
Dae Hyun Yum, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P305
[8]  
Dang Q., 2008, Recommendation for Applications Using Approved Hash Algorithms
[9]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[10]  
Dunkels A., 2007, P 4 WORKSH EMB NETW, P28, DOI DOI 10.1145/1278972.1278979