Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing

被引:0
|
作者
Han, Jiyong [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon, South Korea
关键词
security protocol; pre-shared key; pervasive computing; lightweight;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the proliferation of pervasive computing which enables global connectivity of surrounding objects, the importance of security and its methodology is getting more recognized recently. However, since networking devices composing the pervasive computing are usually resource-constrained compared to traditional devices, there are many difficulties in deploying complex security functionality on them. Even if they have succeeded to provide security protocol, use of heavy authentications such as public key infrastructure or certificate-based credential type often becomes another burden. Meanwhile, the most popular and lightweight authentication type is Pre-shared Key (PSK), however, it can be easily exposed by attackers. To overcome this limitation, we present a pre-shared key chaining system which utilizes lightweight PSK and offers moving defense against key attacks with a small overhead. The system generates a chain of arbitrary PSKs without any secret exchanges and provides a new PSK from the chain at each secure session. This work enables constrained devices to communicate in a secure way without high risks of getting compromised, lightweight all the same.
引用
收藏
页数:3
相关论文
共 50 条
  • [21] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149
  • [22] Private entity authentication for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    International Journal of Network Security, 2012, 14 (02) : 86 - 100
  • [23] Secure lightweight cryptosystem for IoT and pervasive computing
    Abutaha, Mohammed
    Atawneh, Basil
    Hammouri, Layla
    Kaddoum, Georges
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [24] Secure lightweight cryptosystem for IoT and pervasive computing
    Mohammed Abutaha
    Basil Atawneh
    Layla Hammouri
    Georges Kaddoum
    Scientific Reports, 12
  • [25] Lightweight version vectors for pervasive computing devices
    Huang, YW
    Yu, PS
    2000 INTERNATIONAL WORKSHOPS ON PARALLEL PROCESSING, PROCEEDINGS, 2000, : 43 - 48
  • [26] Tailored Security and Safety for Pervasive Computing
    Blass, Erik-Oliver
    Zitterbart, Martina
    INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 85 - +
  • [27] A lightweight security authentication protocol for RFID
    Guosheng Zhao
    Hongqi Bao
    Jian Wang
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [28] Security of lightweight mutual authentication protocols
    Yu-Ju Tu
    Gaurav Kapoor
    Selwyn Piramuthu
    The Journal of Supercomputing, 2021, 77 : 4565 - 4581
  • [29] Towards security and privacy for pervasive computing
    Campbell, R
    Al-Muhtadi, J
    Naldurg, P
    Sampemane, G
    Mickunas, MD
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
  • [30] Security of lightweight mutual authentication protocols
    Tu, Yu-Ju
    Kapoor, Gaurav
    Piramuthu, Selwyn
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4565 - 4581