Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things
نویسندگان
چکیده
In Internet of Things (IoT), cryptography-based security services are widely used to mitigate threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due the high mobility these entities. They may not have established secrets prior key establishment, and establishment has be finished limited time. Existing solutions either rely on having secrets, or latency that meet time limit. This paper proposes new method does use secret trust efficiency. The method, called Trajectory-based Authenticated Key Establishment (TAKE), establishes shared uses it derive pair symmetric keys, using only real-time trajectory data moving entity. can also for authentication establish asymmetric keys. Theoretical analysis experimental evaluation demonstrate TAKE efficiently with multiple levels resist attacks authentication, confidentiality integrity. Experiment results show distinguish authorised them reliability, true positive rate 99% false 0. One finishes within 200 ms, which significantly faster than other without secrets.
منابع مشابه
Deniable Authenticated Key Establishment for Internet Protocols
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof...
متن کاملKey Establishment and Trustful Communication for the Internet of Things
This work describes a practical solution for the problem of cryptographic key establishment and secure communication in the context of the Internet of Things, in which computational e ciency is a fundamental requirement. A symmetric-key establishment protocol based on AES, Poly1305AES, time synchronization, Elliptic Curve Di e-Hellman and sensor IDs is proposed to achieve data con dentiality, a...
متن کاملID-based One-pass Authenticated Key Establishment
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based environment than their two-pass counterparts. However, there is no ID-based one-pass AKE protocol proposed in the literature with a proof of security in an appropriate model. This paper addresses the current gap by proposing a new ID-based one-pass AKE protocol and proving it secure in a formal m...
متن کاملWeaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
In 2003, Boyd and Mao proposed two deniable authenticated key establishment protocols using elliptic curve pairings for Internet protocols, one is based on Diffie-Hellman key exchange and the other is based on Public-Key Encryption approach. For the use of elliptic curve pairings, they declared that their schemes could be more efficient than the existing Internet Key Exchange (IKE), nowadays. H...
متن کاملLeakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we review AKE protocols from a little bit different point of view, i.e. the relationship between information a client needs to possess (for authentication) and immunity to the respective leakage of stored secrets from a clie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3215688