Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication 2015
DOI: 10.1145/2785956.2790021
|View full text |Cite
|
Sign up to set email alerts
|

Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

Abstract: Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identitybased cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deploymentfriendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). Our early results demonstrate feasibility and promise efficiency after ong… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…As mentioned in Section 4.2, a set of lightweight cryptographic algorithms, which do not impose certificate-related overheads on devices, can be used to provide device authentication in UbiComp systems. There is a recent trend that investigates the benefits of using identity-based (IBC) cryptography to provide cross-domain authentication for constrained devices [102,151,159]. However, some IoT platforms still provide certificate-based device authentication such as Azure IoT, WSO2 or per-device public/private key authentication (RSA and Elliptic Curve algorithms) using JSON Web Tokens such as Google Cloud IoT Platform and WSO2.…”
Section: Authenticationmentioning
confidence: 99%
“…As mentioned in Section 4.2, a set of lightweight cryptographic algorithms, which do not impose certificate-related overheads on devices, can be used to provide device authentication in UbiComp systems. There is a recent trend that investigates the benefits of using identity-based (IBC) cryptography to provide cross-domain authentication for constrained devices [102,151,159]. However, some IoT platforms still provide certificate-based device authentication such as Azure IoT, WSO2 or per-device public/private key authentication (RSA and Elliptic Curve algorithms) using JSON Web Tokens such as Google Cloud IoT Platform and WSO2.…”
Section: Authenticationmentioning
confidence: 99%
“…Markmann et al [8] came up with an end-to-end authentication scheme to deploy a federation of gateways in IoT subnetworks. The work is preliminary, also based on IBC, and brings in insightful ideas to the field.…”
Section: Related Workmentioning
confidence: 99%
“…1 Authentication is a fundamental security property for IoT [3]. Although IoT security received enormous attention from the research community (e.g., [4][5][6][7][8][9][10]), we still claim that existing approaches do not fulfill the needs for seamless authentication. First and foremost, traditional schemes are based on Public Key Infrastructure (PKI) and certificates incur significant processing, memory, storage, communication, and management overheads, and are deemed unfit for IoT devices [11].…”
Section: Introductionmentioning
confidence: 99%
“…However, IBE can offer secure systems, which are not achievable using PKE. For example, IBE can maintain IoT security as revealed by [2,8,40,50]. Micro Focus [41] launched a secure email service based on IBE and insisted that "IBE can be used to build security systems that are more dynamic, lightweight, and scalable".…”
Section: Introduction 1backgroundmentioning
confidence: 99%