Proxy-based End-to-End Key Establishment Protocol for the Internet of Things

Pawani Porambage, An Braeken, Pardeep Kumar, Andrei Gurtov, Mika Ylianttila

Research output: Chapter in Book/Report/Conference proceedingConference paperResearch

18 Citations (Scopus)

Abstract

The Internet of Things (IoT) drives the world towards an always connected paradigm by interconnecting wide ranges of network devices irrespective of their resource capabilities and local networks. This would inevitably enhance the requirements of constructing dynamic and secure end-to-end (E2E)connections among the heterogenous network devices with imbalanced resource profiles and less or no previous knowledge about each
other. The device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. We propose a proxy-based key establishment protocol for the IoT, which enables any two unknown high resource constrained devices to initiate secure E2E communication. The high constrained devices should be legitimate and maintain secured connections with the neighbouring less constrained devices in the local networks, in which they are deployed.
The less constrained devices are performing as the proxies and collaboratively advocate the expensive cryptographic operations during the session key computation. Finally, we demonstrate the applicability of our solution in constrained IoT devices by providing performance and security analysis.
Proxy-based End-to-End Key Establishment Protocol for the Internet of Things - ResearchGate. Available from: http://www.researchgate.net/publication/273444044_Proxy-based_End-to-End_Key_Establishment_Protocol_for_the_Internet_of_Things [accessed May 20, 2015].
Original languageEnglish
Title of host publicationICC 2015 Workshop on SECURITY AND PRIVACY FOR INTERNET OF THINGS AND CYBER-PHYSICAL SYSTEMS
PublisherIEEE
Pages2677-2682
Number of pages5
Publication statusPublished - 2015
Event2015 IEEE International Conference on Communication Workshop (ICCW) - London, United Kingdom
Duration: 8 Jun 201512 Jun 2015

Conference

Conference2015 IEEE International Conference on Communication Workshop (ICCW)
Abbreviated titleICCW
CountryUnited Kingdom
CityLondon
Period8/06/1512/06/15

Keywords

  • IoT, Proxy, Lagrange interpolation

Fingerprint Dive into the research topics of 'Proxy-based End-to-End Key Establishment Protocol for the Internet of Things'. Together they form a unique fingerprint.

Cite this