TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things

被引:5
|
作者
Cho, Eunsang [1 ]
Kim, Jeongnyeo [2 ]
Park, Minkyung [1 ]
Lee, Hyeonmin [1 ]
Hamm, Chorom [1 ]
Park, Soobin [1 ]
Sohn, Sungmin [1 ]
Kang, Minhyeok [1 ]
Kwon, Ted Taekyoung [1 ]
机构
[1] Seoul Natl Univ, 1 Gwanak Ro, Seoul 08826, South Korea
[2] Elect & Telecommun Res Inst, 218 Gajeong Ro, Daejeon 34129, South Korea
基金
新加坡国家研究基金会;
关键词
Public key infrastructure; Certificateless public key cryptography; Public key distribution; Internet of things; ENCRYPTION; PKI;
D O I
10.1016/j.comnet.2020.107268
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The current public key infrastructure (PKI) has thorny issues like the overhead of certificate revocations and the consequence of fraudulent certificates. To address such issues, we propose TwinPeaks, which is an infrastructure to distribute public keys of named entities on the Internet and the Internet of Things (IoT). TwinPeaks leverages certificateless public key cryptography (CL-PKC), where a key generation center (KGC) cannot know the private key of its member, and hence its compromise will not result in member key leakage. By extending CL-PKC, the public key of an entity becomes dependent on any combination of its networking parameters; thus TwinPeaks can thwart spoofing attacks systematically. With TwinPeaks, the public key of every named entity is distributed online while addressing the PKI's vulnerabilities. TwinPeaks has public key servers, which constitute the domain name system (DNS)-like hierarchical tree structure. For each parent-child link in the tree, the parent node serves as a key generation center (KGC), and its child nodes set up their own public/secret key pairs by interacting with the KGC as proposed in CL-PKC. In this way, every named entity (e.g., a domain name) has its own public/secret key pair. Thus, a public key of an entity will be provided to a user by its key server as the DNS response is returned to the user by its DNS server. TwinPeaks removes certificates and hence has no revocation overhead. Instead, each named entity should keep/update its networking parameters and public key up-to-date in its DNS server and key server, respectively. By making its public key depend on both its Internet protocol (IP) address and domain name, the compromise of a single entity (e.g., a DNS or key server) cannot lead to successful impersonation. TwinPeaks achieves scalable distribution of public keys since public keys can be cached long term. We also show that TwinPeaks can be applied to the IoT environments by extending the naming scheme.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] A secure and efficient certificateless signature scheme for Internet of Things
    Xiang, Dengmei
    Li, Xuelian
    Gao, Juntao
    Zhang, Xiachuan
    AD HOC NETWORKS, 2022, 124
  • [22] Efficient certificateless access control for industrial Internet of Things
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 285 - 292
  • [23] On the security of a certificateless online/offline signcryption for Internet of Things
    Shi, Wenbo
    Kumar, Neeraj
    Gong, Peng
    Chilamkurti, Naveen
    Chang, Hangbae
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) : 881 - 885
  • [24] An Anonymous Certificateless Signcryption Scheme for Internet of Health Things
    Ullah, Insaf
    Alkhalifah, Ali
    Rehman, Sajjad Ur
    Kumar, Neeraj
    Khan, Muhammad Asghar
    IEEE ACCESS, 2021, 9 (09) : 101207 - 101216
  • [25] On the security of a certificateless online/offline signcryption for Internet of Things
    Wenbo Shi
    Neeraj Kumar
    Peng Gong
    Naveen Chilamkurti
    Hangbae Chang
    Peer-to-Peer Networking and Applications, 2015, 8 : 881 - 885
  • [26] A Security Framework for the Internet of Things based on Public Key Infrastructure
    Ning, Hong
    CONSTRUCTION AND URBAN PLANNING, PTS 1-4, 2013, 671-674 : 3223 - 3226
  • [27] Cryptanalysis of a Certificateless Hybrid Signcryption Scheme and a Certificateless Encryption Scheme for Internet of Things
    Shan, Shan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
    Malik, Manisha
    Dutta, Maitreyee
    Granjal, Jorge
    IEEE ACCESS, 2019, 7 : 27443 - 27464
  • [29] The optimization of the key exchange protocol based on public key certificates in the Internet of Things
    Zhao, Cuijie
    Wang, Guozhen
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 629 - +
  • [30] A Study on the Device Authentication and Key Distribution Method for Internet of Things
    Lee, Jae-Young
    Cho, Do-Eun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 365 - 374