Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures

被引:11
作者
Perez, Salvador [1 ]
Garcia-Carrillo, Dan [2 ]
Marin-Lopez, Rafael [1 ]
Hernandez-Ramos, Jose L. [3 ]
Marin-Perez, Rafael [2 ]
Skarmeta, Antonio F. [1 ]
机构
[1] Univ Murcia, Fac Comp Sci, Dept Informat & Commun Engn, Murcia, Spain
[2] Odin Solut, Murcia, Spain
[3] European Commiss, Joint Res Ctr, I-21027 Ispra, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 95卷
关键词
Internet of things; Security management; Bootstrapping; EDHOC; INTERNET;
D O I
10.1016/j.future.2019.01.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The next generation of IoT scenarios must consider security aspects as a first class component. As a core aspect, key management is crucial for the establishment of security associations between endpoints. According to it, in this work we propose a novel architecture of security association establishment based on bootstrapping technologies in order to manage the life-cycle of cryptographic keys in IoT. Based on our previous work, we propose a key derivation process by using a lightweight bootstrapping mechanism specifically designed for IoT. Then, the derived cryptographic material is used as an authentication credential of the EDHOC protocol, which represents a standardization effort for key agreement in IoT. EDHOC is an application layer alternative to the DIES handshake, in order to provide end-to-end security properties even in the presence of intermediate entities, such as proxies. Evaluation results prove the feasibility of our approach, which represents one of the first efforts to consider application layer security approaches for the IoT. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:570 / 585
页数:16
相关论文
共 68 条
[51]  
Hernández-Ramos JL, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P783, DOI 10.1109/WF-IoT.2015.7389153
[52]  
Hummen R., 2013, Proc. 2nd ACM Work. Hot Top. Wirel. Netw. Secur. Priv. - HotWiSec, V13, P37, DOI DOI 10.1145/2463183.2463193
[53]   DTLS based security and two-way authentication for the Internet of Things [J].
Kothmayr, Thomas ;
Schmitt, Corinna ;
Hu, Wen ;
Bruenig, Michael ;
Carle, Georg .
AD HOC NETWORKS, 2013, 11 (08) :2710-2723
[54]  
Krawczyk H., 2011, Encyclopedia of Cryptography and Security, P921
[55]  
Li S, 2017, SECURING THE INTERNET OF THINGS, P1
[56]  
Lu Yang., IEEE INTERNET THINGS
[57]  
McGrew D., 2011, Fundamental Elliptic Curve Cryptography Algorithms
[58]  
Österlind F, 2006, C LOCAL COMPUT NETW, P641
[59]  
Rao S, 2015, 2015 IEEE CONFERENCE ON WIRELESS SENSORS (ICWISE), P52, DOI 10.1109/ICWISE.2015.7380353
[60]   SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things [J].
Raza, Shahid ;
Helgason, Tomas ;
Papadimitratos, Panos ;
Voigt, Thiemo .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 77 :40-51