2017
DOI: 10.1109/les.2016.2630729
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption

Abstract: Computational complexity of Public Key Cryptography over sensor nodes is not anymore a blocking concern in modern devices which natively (and efficiently) support Elliptic Curve Cryptography. The problem has rather shifted towards the significant airtime consumption required to exchange multiple messages and certificates so as to perform authentication and key agreement. This letter addresses such problem by exploiting implicit certificates (Elliptic Curve Qu-Vanstone). We specifically propose a novel Key Mana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
78
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 86 publications
(78 citation statements)
references
References 12 publications
0
78
0
Order By: Relevance
“…The approach we propose in this paper improves the ones reported in this section under several aspects. First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al nor the use of uncommon certificate formats and schemes like in other works . Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The approach we propose in this paper improves the ones reported in this section under several aspects. First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al nor the use of uncommon certificate formats and schemes like in other works . Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems.…”
Section: Related Workmentioning
confidence: 99%
“…16 With implicit certificates, on the other hand it is possible to obtain certificates that are up to 57 times smaller than standard certificates, and whose verification requires lightweight operations. 17 In the work of Sciancalepore et al, 18 implicit certificates are used to exchange the public coefficients of the widely adopted ECDH key exchange protocol reducing this way up to 86.7% the airtime consumption if compared with traditional approaches. Ting et al 19 proposed to avoid the use of certificates in the IoT segment by resorting to identity-based cryptography techniques, which link meaningful strings to private keys by means of a trusted private key generator.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We evaluated the possibility of adding forward secrecy to the MAC‐layer security. Perfect forward secrecy could be achieved using elliptic‐curve Diffie‐Hellman ephemeral (ECDHE) as performed by Sciancalepore et al in a wireless network. This requires a one round‐trip handshake and thus could be embedded in join‐request and join‐accept messages.…”
Section: Lorawan On Steroids: Using Digital Signaturesmentioning
confidence: 99%
“…Therefore, encryption schemes for IoT systems need to be less complicated, and should function with reduced memory usage, which is dependent on the key size. Compared to conventional systems, elliptical curve cryptography (ECC) can statistically provide stronger security with a smaller key size, thus making it a suitable alternative for IoT devices . The strength of elliptical cryptography relies on the fact that the output of the decryption operation will be ambiguous without a proper authentication key.…”
Section: Introductionmentioning
confidence: 99%