Tampere University of Technology

TUTCRIS Research Portal

IoT-CryptoDiet: Implementing a lightweight cryptographic library based on ecdh and ecdsa for the development of secure and rivacy-preserving protocols in contiki-ng

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationIoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security
EditorsGary Wills, Peter Kacsuk, Victor Chang
PublisherSCITEPRESS
Pages101-111
Number of pages11
ISBN (Electronic)9789897584268
DOIs
Publication statusPublished - 2020
Publication typeA4 Article in a conference publication
EventInternational Conference on Internet of Things, Big Data and Security - Virtual, Online
Duration: 7 May 20209 May 2020

Conference

ConferenceInternational Conference on Internet of Things, Big Data and Security
CityVirtual, Online
Period7/05/209/05/20

Abstract

Even though the idea of transforming basic objects to smart objects with the aid sensors is not new, it is only now that we have started seeing the incredible impact of this digital transformation in our societies. There is no doubt that the Internet of Things (IoT) has the power to change our world and drive us to a complete social evolution. This is something that has been well understood by the research and industrial communities that have been investing significant resources in the field of IoT. In business and industry, there are thousands of IoT use cases and real-life IoT deployments across a variety of sectors (e.g. industry 4.0 and smart factories, smart cities, etc.). However, due to the vastly resource-constrained nature of the devices used in IoT, implementing secure and privacy-preserving services, using, for example, standard asymmetric cryptographic algorithms, has been a real challenge. The majority of IoT devices on the market currently employ the use of various forms of symmetric cryptography such as key pre-distribution. The overall efficiency of such implementations correlates directly to the size of the IoT environment and the deployment method. In this paper, we implement a lightweight cryptographic library that can be used to secure communication protocols between multiple communicating nodes without the need for external trusted entities or a server. Our work focuses on extending the functionalities of the User Datagram Protocol (UDP) broadcast application on the Contiki-NG Operating System (OS) platform.

Keywords

  • Contiki-NG, Elliptic Curve Cryptography, Key Distribution, Privacy, Wireless Sensor Networks.

Publication forum classification

Field of science, Statistics Finland

Downloads statistics

No data available