LISA: Visible light based initialization and SMS based authentication of constrained IoT devices

被引:4
|
作者
Perkovic, Toni [1 ]
Cagalj, Mario [2 ]
Kovacevic, Tonko [3 ]
机构
[1] Univ Split, Univ Dept Forens Studies, Split, Croatia
[2] Univ Split, FESB, Dept Elect Engn, Split, Croatia
[3] Univ Split, Univ Dept Profess Studies, Split, Croatia
关键词
Wireless devices; Key deployment; Visible light channel; Authentication; SECURITY;
D O I
10.1016/j.future.2019.02.052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Future healthcare systems, smart homes, power management systems will all involve a large number of smart inter-connected wireless devices (such as wireless sensor and IoT nodes). One of the major challenges to securing these systems presents loading initial cryptographic credentials into a relatively large number of wireless devices. This challenge is further aggravated by the fact that many of these technologies and systems involve low-cost and highly interface constrained devices - lacking usual wired interfaces, displays, keypads, and alike. In this paper we propose two novel multichannel key deployment schemes for wireless (sensor) networks, LISA and LISAT, that only require a presence of a light source device, such as a multitouch screen, tablet or a smartphone device. Both key deployment schemes are secret key-based multichannel protocols and are suitable for interface/resource constrained wireless devices. We use one-way visible light channel (VLC) of multitouch screens (the flashing displays) to initialize sensor devices in a secure, usable and scalable way. More interestingly, LISAT protocol is suited for initialization of geographically remote devices via a trusted third party device. We provide formal analysis of the proposed protocols using the automated verification tool. From the user's perspective of protocol execution, device initialization is quite simple as user simply places the devices on the top of the multitouch screen after which the remaining process is fully automatized. Indeed, through the experiments with 34 users we showed that our solution is user-friendly and has a good performance concerning the time consumption. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 50 条
  • [41] Comparison of CRC and KECCAK Based Message Authentication for Resource-Constrained Devices
    Yu, Yang
    Tao, Sha
    Dubrova, Elena
    2018 16TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2018, : 217 - 220
  • [42] Energy efficient data communication for WSN based resource constrained IoT devices
    Hudda, Shreeram
    Haribabu, K.
    Barnwal, Rishabh
    INTERNET OF THINGS, 2024, 27
  • [43] Smart Scene Management for IoT-based Constrained Devices Using Checkpointing
    Aissaoui, Francois
    Cooperman, Gene
    Monteil, Thierry
    Tazi, Said
    15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016), 2016, : 170 - 174
  • [44] On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
    Girgenti, Benedetto
    Perazzo, Pericle
    Vallati, Carlo
    Righetti, Francesca
    Dini, Gianluca
    Anastasi, Giuseppe
    2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 225 - 232
  • [45] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [46] Neural Network-Based OFDM Receiver for Resource Constrained IoT Devices
    Soltani N.
    Cheng H.
    Belgiovine M.
    Li Y.
    Li H.
    Azari B.
    D'Oro S.
    Imbiriba T.
    Melodia T.
    Closas P.
    Wang Y.
    Erdogmus D.
    Chowdhury K.
    IEEE Internet of Things Magazine, 2022, 5 (03): : 158 - 164
  • [47] Proximity Based IoT Device Authentication
    Zhang, Jiansong
    Wang, Zeyu
    Yang, Zhice
    Zhang, Qian
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [48] PUF Based Authentication Protocol for IoT
    Braeken, An
    SYMMETRY-BASEL, 2018, 10 (08):
  • [49] Strengthening SMS-Based Authentication through Usability
    AlZomai, Mohammed
    Josang, Audun
    McCullagh, Adrian
    Foo, Ernest
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 683 - +
  • [50] The Concept regarding Vehicular Communications Based on Visible Light Communication and the IoT
    Zadobrischi, Eduard
    ELECTRONICS, 2023, 12 (06)