TUTCRIS - Tampereen teknillinen yliopisto

TUTCRIS

Delayed key exchange for constrained smart devices

Tutkimustuotosvertaisarvioitu

Yksityiskohdat

AlkuperäiskieliEnglanti
OtsikkoLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
KustantajaSpringer Verlag
Sivut12-26
Sivumäärä15
ISBN (painettu)9783662463376
DOI - pysyväislinkit
TilaJulkaistu - 2015
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisussa
TapahtumaAd-Hoc, Mobile and Wireless Networks - , Iso-Britannia
Kesto: 1 tammikuuta 2000 → …

Julkaisusarja

NimiLecture Notes in Computer Science
Vuosikerta8629
ISSN (painettu)0302-9743
ISSN (elektroninen)1611-3349

Conference

ConferenceAd-Hoc, Mobile and Wireless Networks
MaaIso-Britannia
Ajanjakso1/01/00 → …

Tiivistelmä

In the Internet of Things some nodes, especially sensors, can be constrained and sleepy, i.e., they spend extended periods of time in an inaccessible sleep state. Therefore, the services they offer may have to be accessed through gateways. Typically this requires that the gateway is trusted to store and transmit the data. However, if the gateway cannot be trusted, the data needs to be protected end-to-end. One way of achieving end-to-end security is to perform a key exchange, and secure the subsequent messages using the derived shared secrets. However, when the constrained nodes are sleepy this key exchange may have to be done in a delayed fashion. We present a novel way of utilizing the gateway in key exchange, without the possibility of it influencing or compromising the exchanged keys. The paper investigates the applicability of existing protocols for this purpose. Furthermore, due to a possible need for protocol translations, application layer use of the exchanged keys is examined.

Julkaisufoorumi-taso