Authenticated Key Management Protocols for Internet of Things

被引:0
作者
Li, Celia [1 ]
Yang, Cungang [1 ]
机构
[1] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON, Canada
来源
2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT) | 2018年
关键词
Internet of things; Authentication; Key management; Self-certified keys;
D O I
10.1109/ICIOT.2018.00024
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) provides transparent and seamless incorporation of heterogeneous and different end systems. It has been widely used in many applications such as smart homes. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. Effective secure key management for things authentication is the prerequisite of security operations. In this paper, we present an interactive key management protocol and a non-interactive key management protocol to minimize the communication cost of the things. The security analysis show that the proposed schemes are resilient to various types of attacks.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 13 条
[1]  
[Anonymous], P 2003 IEEE S SEC PR
[2]  
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[3]  
ESCHENAUER L, P 9 ACM C COMP COMM
[4]  
Girault M., LNCS, V547, P490
[5]  
Henriques Michelle S., 2017, INT C IOT APPL
[6]   Proper RFID Privacy: Model and Protocols [J].
Hermans, Jens ;
Peeters, Roel ;
Preneel, Bart .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) :2888-2902
[7]  
Horster P., P 2 ACM C COMP COMM, P96
[8]   Energy-efficient and intrusion-resilient authentication for ubiquitous access,to factory floor information [J].
Long, Men ;
Wu, Chwan-Hwa 'John' .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2006, 2 (01) :40-47
[9]  
Manz D, 2008, J INF ASSUR SECUR, V3, P67
[10]  
Perrig A., 2001, P ACM MOBICOM