Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

被引:0
|
作者
Wang, Xiangyang [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Lu, Siqi [1 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
关键词
Hash functions;
D O I
10.1155/2021/9029664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an Internet of things (IoT) technology, the ZigBee has a wide range of applications in home automation, smart energy, commercial building automation, personal, home and hospital care, telecom, and wireless sensor. The ZigBee standard has the advantage of high reliability, which is based on the security of authentication key agreement protocol, namely, the SKKE protocol. In the ZigBee standard, this protocol based on shared symmetric-key is applied on the security protocol level. It is a full symmetric-key key agreement with key confirmation scheme, while the key confirmation mechanism is provided by a message authentication coding mechanism. In this paper, we consider the security of the SKKE protocol. In the random Oracle model, we reduce the security of the SKKE protocol to the collision of the hash function and the HMAC function and the indistinguishability between the output of the random Oracle and a random number. We also give a theoretical proof with the game-based method. To our knowledge, there is no research on the provable security of the ZigBee protocol at this stage, so it is helpful to promote further research of the ZigBee protocol security.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Security in edge-assisted Internet of Things:challenges and solutions
    Shuaiqi SHEN
    Kuan ZHANG
    Yi ZHOU
    Song CI
    Science China(Information Sciences), 2020, 63 (12) : 27 - 40
  • [2] Security in edge-assisted Internet of Things: challenges and solutions
    Shuaiqi Shen
    Kuan Zhang
    Yi Zhou
    Song Ci
    Science China Information Sciences, 2020, 63
  • [3] Security in edge-assisted Internet of Things: challenges and solutions
    Shen, Shuaiqi
    Zhang, Kuan
    Zhou, Yi
    Ci, Song
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (12)
  • [4] Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin
    IEEE NETWORK, 2019, 33 (02): : 50 - 57
  • [5] A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
    Alwarafy, Abdulmalik
    Al-Thelaya, Khaled A.
    Abdallah, Mohamed
    Schneider, Jens
    Hamdi, Mounir
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4004 - 4022
  • [6] Security and privacy of the Internet of Things
    Strous, Leon
    von Solms, Sune
    Zuquete, Andre
    COMPUTERS & SECURITY, 2021, 102
  • [7] Security and Privacy in the Internet of Things
    Seitz, Ludwig
    ERCIM NEWS, 2015, (101): : 17 - 17
  • [8] Security and Privacy on Internet of Things
    Ren, Zejun
    Liu, Xiangang
    Ye, Runguo
    Zhang, Tao
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 140 - 144
  • [9] Security and Privacy in the Internet of Things
    Fawaz, Kassem
    Shin, Kang G.
    COMPUTER, 2019, 52 (04) : 40 - 49
  • [10] Security and privacy for the Internet of Things
    Rullo, Antonino
    Ianni, Michele
    Serra, Edoardo
    FRONTIERS IN COMPUTER SCIENCE, 2023, 5