Proceedings of the 2015 Workshop on IoT Challenges in Mobile and Industrial Systems 2015
DOI: 10.1145/2753476.2753477
|View full text |Cite
|
Sign up to set email alerts
|

Key Management Protocol with Implicit Certificates for IoT systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
51
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 72 publications
(53 citation statements)
references
References 12 publications
1
51
0
1
Order By: Relevance
“…The approach we propose in this paper improves the ones reported in this section under several aspects. First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al nor the use of uncommon certificate formats and schemes like in other works . Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…The approach we propose in this paper improves the ones reported in this section under several aspects. First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al nor the use of uncommon certificate formats and schemes like in other works . Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems.…”
Section: Related Workmentioning
confidence: 98%
“…The use of elliptic curve cryptography (ECC) public keys, described in the work of Guerrero et al, leads to X.509 certificates which are nine times smaller than their RSA counterparts, and it is for this reason that they are extensively used in emerging security protocols targeted to constrained devices such as HIP DEX . With implicit certificates, on the other hand it is possible to obtain certificates that are up to 57 times smaller than standard certificates, and whose verification requires lightweight operations . In the work of Sciancalepore et al, implicit certificates are used to exchange the public coefficients of the widely adopted ECDH key exchange protocol reducing this way up to 86.7% the airtime consumption if compared with traditional approaches.…”
Section: Related Workmentioning
confidence: 99%
“…There is a desire need to propose protocols and management framework for handling privacy in IoT. Latest attempts to address the issue can be found in literature such as [16], [17], [18].…”
Section: A Privacy In Iotmentioning
confidence: 99%
“…Indeed, we cannot pre-share every time a common secret key in each device because the number of connected devices composing the network is very important. If the key pre-distribution is not considered, most of the existing schemes require expensive cryptographic operations to establish a session key between entities that do not share common credentials a priori such as ECDH-based approaches [26]. Indeed, Sciancalepore et al [26] propose a key agreement protocol with implicit certificates in the context of IoT.…”
Section: Introductionmentioning
confidence: 99%
“…If the key pre-distribution is not considered, most of the existing schemes require expensive cryptographic operations to establish a session key between entities that do not share common credentials a priori such as ECDH-based approaches [26]. Indeed, Sciancalepore et al [26] propose a key agreement protocol with implicit certificates in the context of IoT. Their approach requires four costly operations in order to negotiate a common key between two parties.…”
Section: Introductionmentioning
confidence: 99%