TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things

被引:5
|
作者
Cho, Eunsang [1 ]
Kim, Jeongnyeo [2 ]
Park, Minkyung [1 ]
Lee, Hyeonmin [1 ]
Hamm, Chorom [1 ]
Park, Soobin [1 ]
Sohn, Sungmin [1 ]
Kang, Minhyeok [1 ]
Kwon, Ted Taekyoung [1 ]
机构
[1] Seoul Natl Univ, 1 Gwanak Ro, Seoul 08826, South Korea
[2] Elect & Telecommun Res Inst, 218 Gajeong Ro, Daejeon 34129, South Korea
基金
新加坡国家研究基金会;
关键词
Public key infrastructure; Certificateless public key cryptography; Public key distribution; Internet of things; ENCRYPTION; PKI;
D O I
10.1016/j.comnet.2020.107268
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The current public key infrastructure (PKI) has thorny issues like the overhead of certificate revocations and the consequence of fraudulent certificates. To address such issues, we propose TwinPeaks, which is an infrastructure to distribute public keys of named entities on the Internet and the Internet of Things (IoT). TwinPeaks leverages certificateless public key cryptography (CL-PKC), where a key generation center (KGC) cannot know the private key of its member, and hence its compromise will not result in member key leakage. By extending CL-PKC, the public key of an entity becomes dependent on any combination of its networking parameters; thus TwinPeaks can thwart spoofing attacks systematically. With TwinPeaks, the public key of every named entity is distributed online while addressing the PKI's vulnerabilities. TwinPeaks has public key servers, which constitute the domain name system (DNS)-like hierarchical tree structure. For each parent-child link in the tree, the parent node serves as a key generation center (KGC), and its child nodes set up their own public/secret key pairs by interacting with the KGC as proposed in CL-PKC. In this way, every named entity (e.g., a domain name) has its own public/secret key pair. Thus, a public key of an entity will be provided to a user by its key server as the DNS response is returned to the user by its DNS server. TwinPeaks removes certificates and hence has no revocation overhead. Instead, each named entity should keep/update its networking parameters and public key up-to-date in its DNS server and key server, respectively. By making its public key depend on both its Internet protocol (IP) address and domain name, the compromise of a single entity (e.g., a DNS or key server) cannot lead to successful impersonation. TwinPeaks achieves scalable distribution of public keys since public keys can be cached long term. We also show that TwinPeaks can be applied to the IoT environments by extending the naming scheme.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] TwinPeaks: A New Approach for Certificateless Public Key Distribution
    Cho, Eunsang
    Park, Minkyung
    Kwon, Ted Taekyoung
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 10 - 18
  • [2] Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
    Ma, Mimi
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    Chen, Jianhua
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) : 759 - 767
  • [3] A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things
    Liu, Xiaoguang
    Sun, Yingying
    Dong, Hao
    FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 69 - 86
  • [4] Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things
    He, Debiao
    Ma, Mimi
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3618 - 3627
  • [5] VCLPKES: Verifiable Certificateless Public Key Searchable Encryption Scheme for Industrial Internet of Things
    Zhang, Yulei
    Liu, Xiangzhen
    Lang, Xiaoli
    Zhang, Yongjie
    Wang, Caifen
    IEEE ACCESS, 2020, 8 (08): : 20849 - 20861
  • [6] Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things
    Guo, Rui
    Wen, Qiaoyan
    Shi, Huixian
    Jin, Zhengping
    Zhang, Hua
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [7] A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
    Liu, Xiaoguang
    Dong, Hao
    Kumari, Neha
    Kar, Jayaprakash
    IEEE ACCESS, 2023, 11 : 58754 - 58764
  • [8] PKIoT: A public key infrastructure for the Internet of Things
    Marino, Francesco
    Moiso, Corrado
    Petracca, Matteo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [9] Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
    Libing Wu
    Yubo Zhang
    Mimi Ma
    Neeraj Kumar
    Debiao He
    Annals of Telecommunications, 2019, 74 : 423 - 434
  • [10] Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
    Wu, Libing
    Zhang, Yubo
    Ma, Mimi
    Kumar, Neeraj
    He, Debiao
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 423 - 434