Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing

被引:0
|
作者
Han, Jiyong [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon, South Korea
关键词
security protocol; pre-shared key; pervasive computing; lightweight;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the proliferation of pervasive computing which enables global connectivity of surrounding objects, the importance of security and its methodology is getting more recognized recently. However, since networking devices composing the pervasive computing are usually resource-constrained compared to traditional devices, there are many difficulties in deploying complex security functionality on them. Even if they have succeeded to provide security protocol, use of heavy authentications such as public key infrastructure or certificate-based credential type often becomes another burden. Meanwhile, the most popular and lightweight authentication type is Pre-shared Key (PSK), however, it can be easily exposed by attackers. To overcome this limitation, we present a pre-shared key chaining system which utilizes lightweight PSK and offers moving defense against key attacks with a small overhead. The system generates a chain of arbitrary PSKs without any secret exchanges and provides a new PSK from the chain at each secure session. This work enables constrained devices to communicate in a secure way without high risks of getting compromised, lightweight all the same.
引用
收藏
页数:3
相关论文
共 50 条
  • [41] Trustworthy pervasive computing: The hard security problems
    Ranganathan, K
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 117 - 121
  • [42] Security Access Model in Pervasive Computing Environment
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
  • [43] Dissecting the Security and Protection Issues in Pervasive Computing
    Javaid, Qaisar
    Yasmeen, Humera
    Shah, Munam Ali
    Kamran, Muhammad
    Sohail, Adnan
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2018, 37 (02) : 241 - 256
  • [44] Security in Automotive Networks: Lightweight Authentication and Authorization
    Mundhenk, Philipp
    Paverd, Andrew
    Mrowca, Artur
    Steinhorst, Sebastian
    Lukasiewycz, Martin
    Fahmy, Suhaib A.
    Chakraborty, Samarjit
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2017, 22 (02)
  • [45] The importance of high assurance security in pervasive computing
    Karger, PA
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 9 - 9
  • [46] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510
  • [47] Lightweight RFID Authentication with Forward and Backward Security
    Burmester, Mike
    Munilla, Jorge
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [48] It's no secret Measuring the security and reliability of authentication via 'secret' questions
    Schechter, Stuart
    Brush, A. J. Bernheim
    Egelman, Serge
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 375 - 390
  • [49] An Anonymous Lightweight Authentication Scheme with Scalability for Trustworthy Pervasive Social Networking
    Ogundoyin, Sunday Oyinlola (honsybee@yahoo.com), 1600, Taylor and Francis Ltd. (01): : 3 - 4
  • [50] The master key: A private authentication approach for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +