Delayed key exchange for constrained smart devices

Joona Kannisto, Seppo Heikkinen, Kristian Slavov, Jarmo Harju

    Tutkimustuotos: KonferenssiartikkeliScientificvertaisarvioitu

    1 Sitaatiot (Scopus)

    Abstrakti

    In the Internet of Things some nodes, especially sensors, can be constrained and sleepy, i.e., they spend extended periods of time in an inaccessible sleep state. Therefore, the services they offer may have to be accessed through gateways. Typically this requires that the gateway is trusted to store and transmit the data. However, if the gateway cannot be trusted, the data needs to be protected end-to-end. One way of achieving end-to-end security is to perform a key exchange, and secure the subsequent messages using the derived shared secrets. However, when the constrained nodes are sleepy this key exchange may have to be done in a delayed fashion. We present a novel way of utilizing the gateway in key exchange, without the possibility of it influencing or compromising the exchanged keys. The paper investigates the applicability of existing protocols for this purpose. Furthermore, due to a possible need for protocol translations, application layer use of the exchanged keys is examined.

    AlkuperäiskieliEnglanti
    OtsikkoLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    KustantajaSpringer Verlag
    Sivut12-26
    Sivumäärä15
    ISBN (painettu)9783662463376
    DOI - pysyväislinkit
    TilaJulkaistu - 2015
    OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisussa
    TapahtumaAd-Hoc, Mobile and Wireless Networks - , Iso-Britannia
    Kesto: 1 tammik. 2000 → …

    Julkaisusarja

    NimiLecture Notes in Computer Science
    Vuosikerta8629
    ISSN (painettu)0302-9743
    ISSN (elektroninen)1611-3349

    Conference

    ConferenceAd-Hoc, Mobile and Wireless Networks
    Maa/AlueIso-Britannia
    Ajanjakso1/01/00 → …

    Julkaisufoorumi-taso

    • Ei tasoa

    !!ASJC Scopus subject areas

    • Yleinen tietojenkäsittelytiede
    • Theoretical Computer Science

    Sormenjälki

    Sukella tutkimusaiheisiin 'Delayed key exchange for constrained smart devices'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

    Siteeraa tätä