2014
DOI: 10.1016/j.comnet.2014.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight collaborative key establishment scheme for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 81 publications
(34 citation statements)
references
References 19 publications
0
34
0
Order By: Relevance
“…They exploit a common set of less constrained nodes as the proxies for supporting both the initiator and responder. Similar to the proxybased solution in [7], this approach is not fitting either with the actual scenarios, due to the requirement of establishing secure links with a single set of proxies. This shortcoming is resolved in our previous work [28], which explains a collaborative HIP solution for high constrained devices with theoretical energy estimations.…”
Section: Other Hip Variantsmentioning
confidence: 99%
See 2 more Smart Citations
“…They exploit a common set of less constrained nodes as the proxies for supporting both the initiator and responder. Similar to the proxybased solution in [7], this approach is not fitting either with the actual scenarios, due to the requirement of establishing secure links with a single set of proxies. This shortcoming is resolved in our previous work [28], which explains a collaborative HIP solution for high constrained devices with theoretical energy estimations.…”
Section: Other Hip Variantsmentioning
confidence: 99%
“…Later on, the key can be reused until there is a necessity for rekeying. Therefore, a lengthy key establishment process, such as few seconds, is still acceptable as long as it occurs once in a while during the entire operational mode [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the gateway is able to launch a manin-the-middle attack and to establish a common Diffie-Hellman key with each party without anyone noticing. Saied et al [25] propose a lightweight collaborative key agreement based on Diffie-Hellman (DH) key establishment. Their idea is to delegate the heavyweight cryptographic calculation of DH values to the resource-unconstrained trusted proxies in neighborhood.…”
Section: Introductionmentioning
confidence: 99%
“…[6] introduces the problem of securing the most constrained IoT nodes from an energy point of view. Establishment of cryptographic material between communicating parties is the building block of any other security service; [7] gives a thorough introduction to the authenticated key establishment problem for IoT and categorizes the possible solutions. Several lightweight key establishment proposal exist.…”
Section: A Related Workmentioning
confidence: 99%