Chaining the secret: Lightweight authentication for security in pervasive computing

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 47
  • Download : 0
With the proliferation of pervasive computing which enables global connectivity of surrounding objects, the importance of security and its methodology is getting more recognized recently. However, since networking devices composing the pervasive computing are usually resource-constrained compared to traditional devices, there are many difficulties in deploying complex security functionality on them. Even if they have succeeded to provide security protocol, use of heavy authentications such as public key infrastructure or certificate-based credential type often becomes another burden. Meanwhile, the most popular and lightweight authentication type is Pre-shared Key (PSK), however, it can be easily exposed by attackers. To overcome this limitation, we present a pre-shared key chaining system which utilizes lightweight PSK and offers moving defense against key attacks with a small overhead. The system generates a chain of arbitrary PSKs without any secret exchanges and provides a new PSK from the chain at each secure session. This work enables constrained devices to communicate in a secure way without high risks of getting compromised, lightweight all the same.
Publisher
IEEE Computer Society
Issue Date
2016-03
Language
English
Citation

13th IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016

DOI
10.1109/PERCOMW.2016.7457084
URI
http://hdl.handle.net/10203/312864
Appears in Collection
RIMS Conference Papers
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0