Session Key Agreement for End-to-End Security in Time-Synchronized Networks

被引:0
作者
Wang, Qinghua [1 ]
Huang, Xin [2 ]
Mengistu, Dawit [1 ]
机构
[1] Kristianstad Univ, Dept Comp Sci, Fac Nat Sci, SE-29188 Kristianstad, Sweden
[2] Xian Jiaotong Liverpool Univ, Dept Comp Sci & Software Engn, Suzhou, Peoples R China
来源
2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018) | 2018年
关键词
Session key; time synchronization; security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Time synchronization is important for many network applications. This paper utilizes the fact that time service is a standard service in almost all kinds of computer networks, and proposes a new session key agreement protocol by building sessions keys based on the locally available time information. A prototype system has been tested in the simulation environment and the results are promising.
引用
收藏
页码:493 / 496
页数:4
相关论文
共 11 条
[1]   A comparison of 802.11ah and 802.15.4 for IoT [J].
Ahmed, N. ;
Rahman, H. ;
Hussain, Md. I. .
ICT EXPRESS, 2016, 2 (03) :100-102
[2]  
[Anonymous], 2001, 197 NIST AES FIPS
[3]  
Ferguson N., 2010, CRYPTOGRAPHY ENG DES, P259
[4]  
HMAC, KEYED HASHING MESSAG
[5]  
IEEE, 80211I2004 IEEE
[6]  
Lea P., 2018, Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
[7]   Medium Access Control for Wireless Body Area Networks with QoS Provisioning and Energy Efficient Design [J].
Liu, Bin ;
Yan, Zhisheng ;
Chen, Chang Wen .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (02) :422-434
[8]  
Stallings W, 2014, COMPUTER SECURITY HANDBOOK, 6TH EDITION, VOL 1
[9]   Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 [J].
Vanhoef, Mathy ;
Piessens, Frank .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1313-1328
[10]  
Wang QH, 2010, WIRELESS SENSOR NETWORKS: APPLICATION-CENTRIC DESIGN, P3