Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing

被引:0
|
作者
Han, Jiyong [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon, South Korea
关键词
security protocol; pre-shared key; pervasive computing; lightweight;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the proliferation of pervasive computing which enables global connectivity of surrounding objects, the importance of security and its methodology is getting more recognized recently. However, since networking devices composing the pervasive computing are usually resource-constrained compared to traditional devices, there are many difficulties in deploying complex security functionality on them. Even if they have succeeded to provide security protocol, use of heavy authentications such as public key infrastructure or certificate-based credential type often becomes another burden. Meanwhile, the most popular and lightweight authentication type is Pre-shared Key (PSK), however, it can be easily exposed by attackers. To overcome this limitation, we present a pre-shared key chaining system which utilizes lightweight PSK and offers moving defense against key attacks with a small overhead. The system generates a chain of arbitrary PSKs without any secret exchanges and provides a new PSK from the chain at each secure session. This work enables constrained devices to communicate in a secure way without high risks of getting compromised, lightweight all the same.
引用
收藏
页数:3
相关论文
共 50 条
  • [11] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 186 - 202
  • [12] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [13] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [14] Towards pervasive computing security
    Mohammed, L. A.
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 810 - 815
  • [15] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [16] Secret image sharing with authentication-chaining and dynamic embedding
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) : 803 - 809
  • [17] A Lightweight iot Terminal security access authentication Method Based on edge Computing
    Zhou, Xiangfeng
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON POWER ELECTRONICS AND ARTIFICIAL INTELLIGENCE, PEAI 2024, 2024, : 511 - 514
  • [18] The security of the cipher block chaining message authentication code
    Bellare, M
    Kilian, J
    Rogaway, P
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) : 362 - 399
  • [19] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [20] Research on use of distributed authentication in pervasive computing
    Liu, Hui
    Zhang, Cai-Ming
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 571 - +