TY - GEN
T1 - Delayed key exchange for constrained smart devices
AU - Kannisto, Joona
AU - Heikkinen, Seppo
AU - Slavov, Kristian
AU - Harju, Jarmo
PY - 2015
Y1 - 2015
N2 - In the Internet of Things some nodes, especially sensors, can be constrained and sleepy, i.e., they spend extended periods of time in an inaccessible sleep state. Therefore, the services they offer may have to be accessed through gateways. Typically this requires that the gateway is trusted to store and transmit the data. However, if the gateway cannot be trusted, the data needs to be protected end-to-end. One way of achieving end-to-end security is to perform a key exchange, and secure the subsequent messages using the derived shared secrets. However, when the constrained nodes are sleepy this key exchange may have to be done in a delayed fashion. We present a novel way of utilizing the gateway in key exchange, without the possibility of it influencing or compromising the exchanged keys. The paper investigates the applicability of existing protocols for this purpose. Furthermore, due to a possible need for protocol translations, application layer use of the exchanged keys is examined.
AB - In the Internet of Things some nodes, especially sensors, can be constrained and sleepy, i.e., they spend extended periods of time in an inaccessible sleep state. Therefore, the services they offer may have to be accessed through gateways. Typically this requires that the gateway is trusted to store and transmit the data. However, if the gateway cannot be trusted, the data needs to be protected end-to-end. One way of achieving end-to-end security is to perform a key exchange, and secure the subsequent messages using the derived shared secrets. However, when the constrained nodes are sleepy this key exchange may have to be done in a delayed fashion. We present a novel way of utilizing the gateway in key exchange, without the possibility of it influencing or compromising the exchanged keys. The paper investigates the applicability of existing protocols for this purpose. Furthermore, due to a possible need for protocol translations, application layer use of the exchanged keys is examined.
UR - http://www.scopus.com/inward/record.url?scp=84922776150&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-46338-3_2
DO - 10.1007/978-3-662-46338-3_2
M3 - Conference contribution
AN - SCOPUS:84922776150
SN - 9783662463376
T3 - Lecture Notes in Computer Science
SP - 12
EP - 26
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PB - Springer Verlag
T2 - Ad-Hoc, Mobile and Wireless Networks
Y2 - 1 January 2000
ER -