Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing

被引:0
|
作者
Han, Jiyong [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon, South Korea
关键词
security protocol; pre-shared key; pervasive computing; lightweight;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the proliferation of pervasive computing which enables global connectivity of surrounding objects, the importance of security and its methodology is getting more recognized recently. However, since networking devices composing the pervasive computing are usually resource-constrained compared to traditional devices, there are many difficulties in deploying complex security functionality on them. Even if they have succeeded to provide security protocol, use of heavy authentications such as public key infrastructure or certificate-based credential type often becomes another burden. Meanwhile, the most popular and lightweight authentication type is Pre-shared Key (PSK), however, it can be easily exposed by attackers. To overcome this limitation, we present a pre-shared key chaining system which utilizes lightweight PSK and offers moving defense against key attacks with a small overhead. The system generates a chain of arbitrary PSKs without any secret exchanges and provides a new PSK from the chain at each secure session. This work enables constrained devices to communicate in a secure way without high risks of getting compromised, lightweight all the same.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] An Ultra lightweight encryption design for security in pervasive computing
    Bansod, Gaurav
    Patil, Abhijit
    Sutar, Swapnil
    Pisharoty, N.
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 79 - 84
  • [2] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [3] An authentication based lightweight device discovery (ALDD) model for pervasive computing environment
    Haque, Munirul M.
    Ahamed, Sheikh I.
    Li, Haifeng
    Asif, K. M.
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 57 - +
  • [4] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [5] An authentication protocol for pervasive computing
    Li, SQ
    Zhou, JY
    Li, XX
    Chen, KF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
  • [6] Security in pervasive computing
    Stajano, F
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 6 - 8
  • [7] A lightweight cyber security framework with context-awareness for pervasive computing environments
    Al-Muhtadi, Jalal
    Saleem, Kashif
    Al-Rabiaah, Sumayah
    Imran, Muhammad
    Gawanmeh, Amjad
    Rodrigues, Joel J. P. C.
    SUSTAINABLE CITIES AND SOCIETY, 2021, 66
  • [8] Security Enhancement on a Lightweight Authentication Scheme With Anonymity Fog Computing Architecture
    Wang, Lin
    An, Haonan
    Chang, Zhuo
    IEEE ACCESS, 2020, 8 : 97267 - 97278
  • [9] Hierarchical trustworthy authentication for pervasive computing
    Xiao, Hannan
    Malcolm, James A.
    Christianson, Bruce
    Zhang, Ying
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 87 - +
  • [10] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (03) : 469 - 481