Delayed key exchange for constrained smart devices

Joona Kannisto, Seppo Heikkinen, Kristian Slavov, Jarmo Harju

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review


    In the Internet of Things some nodes, especially sensors, can be constrained and sleepy, i.e., they spend extended periods of time in an inaccessible sleep state. Therefore, the services they offer may have to be accessed through gateways. Typically this requires that the gateway is trusted to store and transmit the data. However, if the gateway cannot be trusted, the data needs to be protected end-to-end. One way of achieving end-to-end security is to perform a key exchange, and secure the subsequent messages using the derived shared secrets. However, when the constrained nodes are sleepy this key exchange may have to be done in a delayed fashion. We present a novel way of utilizing the gateway in key exchange, without the possibility of it influencing or compromising the exchanged keys. The paper investigates the applicability of existing protocols for this purpose. Furthermore, due to a possible need for protocol translations, application layer use of the exchanged keys is examined.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    PublisherSpringer Verlag
    Number of pages15
    ISBN (Print)9783662463376
    Publication statusPublished - 2015
    Publication typeA4 Article in conference proceedings
    EventAd-Hoc, Mobile and Wireless Networks - , United Kingdom
    Duration: 1 Jan 2000 → …

    Publication series

    NameLecture Notes in Computer Science
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349


    ConferenceAd-Hoc, Mobile and Wireless Networks
    Country/TerritoryUnited Kingdom
    Period1/01/00 → …

    Publication forum classification

    • No publication forum level

    ASJC Scopus subject areas

    • Computer Science(all)
    • Theoretical Computer Science


    Dive into the research topics of 'Delayed key exchange for constrained smart devices'. Together they form a unique fingerprint.

    Cite this