Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture

被引:3
作者
Bhattacharjya, Sairath [1 ]
Saiedian, Hossein [1 ,2 ]
机构
[1] Univ Kansas, Elect Engn & Comp Sci, Lawrence, KS 66045 USA
[2] Univ Kansas, Informat & Telecommun Technol Ctr ITIC, Lawrence, KS 66045 USA
关键词
IoT; Security; Zero-trust; Key generation; Plug-and-play; Elliptic curve cryptography (ECC); Zero interaction pairing (ZIP); Zero-interaction authentication (ZIA); INTERNET; TRUST;
D O I
10.1007/s10207-021-00562-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT devices are slowly turning out to be an essential part of our everyday lives. These devices perform one operation, and they specialize in doing so. When communicating with these devices, we need to set up a secured key preventing unauthorized communications. We have been using the plug-and-play model for electronic devices for decades. These IoT devices fall into the same realm. The plug-pair-play connection model follows the same principle so that the user does not feel the added pressure of remembering a complex password or rely on a default credential. It helps to generate a secret that is only known to the device and its user. We used elliptic curve cryptography to circumvent the resource limitations on the device. The model establishes a zero-trust pattern where all requests and responses are validated and verified before being processed. This paper provides a unique way to set up a secret key for each user and device pair without much user interaction. The model sets the path to end-to-end secured communication.
引用
收藏
页码:427 / 436
页数:10
相关论文
共 19 条
[1]   Increasing LPWAN Scalability by Means of Concurrent Multiband IoT Technologies: An Industry 4.0 use Case [J].
Adame, Toni ;
Bel, Albert ;
Bellalta, Boris .
IEEE ACCESS, 2019, 7 :46990-47010
[2]   A Survey on Authentication Techniques for the Internet of Things [J].
Atwady, Yahya ;
Hammoudeh, Mohammad .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
[3]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[4]   End-to-End Trust and Security for Internet of Things Applications [J].
Bhattarai, Sulabh ;
Wang, Yong .
COMPUTER, 2018, 51 (04) :20-27
[5]  
Columbus Louis., 2019, 2018 roundup of internet of things forecasts and market estimates
[6]   Approximate Computing for Low Power and Security in the Internet of Things [J].
Gao, Mingze ;
Wang, Qian ;
Arafin, Md Tanvir ;
Lyu, Yongqiang ;
Qu, Gang .
COMPUTER, 2017, 50 (06) :27-34
[7]  
Goasduff L, 2019, GARTNER SAYS 5 80000
[8]  
Hilton Scott, 2016, Dyn analysis summary of friday october 21 attack
[9]  
Hollick M, 2019, P ACM INT MOB WEAR U, V3
[10]  
Huth C, 2015, ANN IEEE SYST CONF, P8, DOI 10.1109/SYSCON.2015.7116721