LISA: Visible light based initialization and SMS based authentication of constrained IoT devices

被引:4
|
作者
Perkovic, Toni [1 ]
Cagalj, Mario [2 ]
Kovacevic, Tonko [3 ]
机构
[1] Univ Split, Univ Dept Forens Studies, Split, Croatia
[2] Univ Split, FESB, Dept Elect Engn, Split, Croatia
[3] Univ Split, Univ Dept Profess Studies, Split, Croatia
关键词
Wireless devices; Key deployment; Visible light channel; Authentication; SECURITY;
D O I
10.1016/j.future.2019.02.052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Future healthcare systems, smart homes, power management systems will all involve a large number of smart inter-connected wireless devices (such as wireless sensor and IoT nodes). One of the major challenges to securing these systems presents loading initial cryptographic credentials into a relatively large number of wireless devices. This challenge is further aggravated by the fact that many of these technologies and systems involve low-cost and highly interface constrained devices - lacking usual wired interfaces, displays, keypads, and alike. In this paper we propose two novel multichannel key deployment schemes for wireless (sensor) networks, LISA and LISAT, that only require a presence of a light source device, such as a multitouch screen, tablet or a smartphone device. Both key deployment schemes are secret key-based multichannel protocols and are suitable for interface/resource constrained wireless devices. We use one-way visible light channel (VLC) of multitouch screens (the flashing displays) to initialize sensor devices in a secure, usable and scalable way. More interestingly, LISAT protocol is suited for initialization of geographically remote devices via a trusted third party device. We provide formal analysis of the proposed protocols using the automated verification tool. From the user's perspective of protocol execution, device initialization is quite simple as user simply places the devices on the top of the multitouch screen after which the remaining process is fully automatized. Indeed, through the experiments with 34 users we showed that our solution is user-friendly and has a good performance concerning the time consumption. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 50 条
  • [21] Towards Security Authentication for IoT Devices with Lattice-Based ZK
    Cai, Jie
    Jiang, Han
    Xu, Qiuliang
    Lv, Guangshi
    Zhao, Minghao
    Wang, Hao
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 141 - 150
  • [22] Light Weight Cryptography for Resource Constrained IoT Devices
    Al Shebli, Hessa Mohammed Zaher
    Beheshti, Babak D.
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 1, 2019, 880 : 196 - 204
  • [23] Light-SAE: A Lightweight Authentication Protocol for Large-Scale IoT Environments Made With Constrained Devices
    Rosa, Pedro
    Souto, Andre
    Cecilio, Jose
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 2428 - 2441
  • [24] Architectural Design of Token based Authentication of MQTT Protocol in Constrained IoT Device
    Bhawiyuga, Adhitya
    Data, Mahendra
    Warda, Andri
    2017 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2017,
  • [25] RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices
    Shao, Sihua
    Khreishah, Abdallah
    Khalil, Issa
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1025 - 1033
  • [26] Light Weight Authentication Scheme for Smart Home IoT Devices
    Kumar, Vipin
    Malik, Navneet
    Singla, Jimmy
    Jhanjhi, N. Z.
    Amsaad, Fathi
    Razaque, Abdul
    CRYPTOGRAPHY, 2022, 6 (03)
  • [27] Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol
    Duy An Ha
    Kha Tho Nguyen
    Zao, John K.
    PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2016), 2016, : 173 - 179
  • [28] Performance evaluation of Attribute-Based Encryption on constrained IoT devices*
    Perazzo, Pericle
    Righetti, Francesca
    La Manna, Michele
    Vallati, Carlo
    COMPUTER COMMUNICATIONS, 2021, 170 : 151 - 163
  • [29] A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices
    Yilmaz, Yildiran
    Halak, Basel
    2019 IEEE 4TH INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW 2019), 2019, : 31 - 36
  • [30] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67