Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing

被引:0
|
作者
Han, Jiyong [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon, South Korea
关键词
security protocol; pre-shared key; pervasive computing; lightweight;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the proliferation of pervasive computing which enables global connectivity of surrounding objects, the importance of security and its methodology is getting more recognized recently. However, since networking devices composing the pervasive computing are usually resource-constrained compared to traditional devices, there are many difficulties in deploying complex security functionality on them. Even if they have succeeded to provide security protocol, use of heavy authentications such as public key infrastructure or certificate-based credential type often becomes another burden. Meanwhile, the most popular and lightweight authentication type is Pre-shared Key (PSK), however, it can be easily exposed by attackers. To overcome this limitation, we present a pre-shared key chaining system which utilizes lightweight PSK and offers moving defense against key attacks with a small overhead. The system generates a chain of arbitrary PSKs without any secret exchanges and provides a new PSK from the chain at each secure session. This work enables constrained devices to communicate in a secure way without high risks of getting compromised, lightweight all the same.
引用
收藏
页数:3
相关论文
共 50 条
  • [31] Security in pervasive computing - Calling for new security principles
    Zugenmaier, Alf
    Walter, Thomas
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 96 - +
  • [32] Security for whom? The shifting security assumptions of pervasive computing
    Stajano, F
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 16 - 27
  • [33] Memristors for Secret Sharing-Based Lightweight Authentication
    Arafin, Md Tanvir
    Qu, Gang
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 26 (12) : 2671 - 2683
  • [34] An authentication mechanism of digital contents in pervasive computing environment
    Jang, Eun-Gyeom
    Koh, Byoung-Soo
    Choi, Yong-Rak
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 527 - +
  • [35] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
  • [36] Lightweight ontology-driven representations in pervasive computing
    Domaszewicz, J
    Rój, M
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 642 - 651
  • [37] Lightweight ontology-driven representations in pervasive computing
    Domaszewicz, J. (j.domaszewicz@tele.pw.edu.pl), (Springer Verlag):
  • [38] Microcontrollers as (In) Security Devices for Pervasive Computing Applications
    Strobel, Daehyun
    Oswald, David
    Richter, Bastian
    Schellenberg, Falk
    Paar, Christof
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1157 - 1173
  • [39] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [40] Security in ad hoc networks and pervasive computing
    Wu, Isaac Z.
    Li, X. -Y.
    Song, M.
    Liu, C. -M.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 359 - 361