Proceedings 2018 Workshop on Decentralized IoT Security and Standards 2018
DOI: 10.14722/diss.2018.23004
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Authentication and Key Exchange Protocol for IoT

Abstract: Security in IoT environments is critical, as there are many situations where IoT devices provide sensory information that needs to be shared securely. However, providing authenticated and secure communication for IoT devices can be a challenge. IoT devices have many constraints, including limitations in computation, power, memory and energy. Moreover, they often have to go through a gateway/sink to connect to the network. For secure communication to the rest of the network, the IoT device needs to trust the ga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…Lightweight key exchange protocols that use pre-shared secret symmetric keys are proposed in [8]- [9]. These protocols assume that one or more symmetric keys are readily available to the client and the server before the handshake protocol begins.…”
Section: Related Workmentioning
confidence: 99%
“…Lightweight key exchange protocols that use pre-shared secret symmetric keys are proposed in [8]- [9]. These protocols assume that one or more symmetric keys are readily available to the client and the server before the handshake protocol begins.…”
Section: Related Workmentioning
confidence: 99%
“…SHA256 based on Hash-based Message Authentication Code (HMAC). It calculates the message authentication code which speci es the hash function combination with secret cryptographic key for authentication [17].…”
Section: Applied Authentication Routinementioning
confidence: 99%
“…There are different lightweight approaches to deal with authentication and corrupted message issues in the IoT. For example, embedding digital certificates, signed by the manufacturer, into devices can solve authentication and key exchange problems in some IoT applications [55]. However, there are many devices that cannot cope with this approach.…”
Section: ) Lightweight Message Authentication Code (Mac)mentioning
confidence: 99%