Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture

Renzo E. Navas, Manuel Lagos, L. Toutain, Kumaran Vijayasankar
{"title":"Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture","authors":"Renzo E. Navas, Manuel Lagos, L. Toutain, Kumaran Vijayasankar","doi":"10.1109/WF-IoT.2016.7845424","DOIUrl":null,"url":null,"abstract":"The Internet of Things will scale to billions of devices in the next coming years. A secure communication framework is needed to interconnect all these objects, by taking into account their intrinsic constrained in terms of energy, cpu and memory; Several proposals relying on adapting existing well-known and standardized security solutions exist, but we believe there is still a gap for most-constrained nodes to provide fine-grained authorization and secure establishment of fresh cryptographic keys. We propose a mechanism that runs on top of the OAuth Authorization architecture and provides the bootstrapping of fresh authenticated symmetric cryptographic material between previously unknown parties using a nonce-based protocol. We set up an energy measurement platform to evaluate our proposal and compare it with existing work.","PeriodicalId":373932,"journal":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","volume":"44 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WF-IoT.2016.7845424","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

The Internet of Things will scale to billions of devices in the next coming years. A secure communication framework is needed to interconnect all these objects, by taking into account their intrinsic constrained in terms of energy, cpu and memory; Several proposals relying on adapting existing well-known and standardized security solutions exist, but we believe there is still a gap for most-constrained nodes to provide fine-grained authorization and secure establishment of fresh cryptographic keys. We propose a mechanism that runs on top of the OAuth Authorization architecture and provides the bootstrapping of fresh authenticated symmetric cryptographic material between previously unknown parties using a nonce-based protocol. We set up an energy measurement platform to evaluate our proposal and compare it with existing work.
基于OAuth 2.0物联网拥有证明架构的基于随机数的认证密钥建立
未来几年,物联网将扩展到数十亿台设备。考虑到这些对象在能量、cpu和内存方面的内在约束,需要一个安全的通信框架来互连所有这些对象;有几个建议依赖于改编现有的知名和标准化的安全解决方案,但我们认为,对于最受约束的节点来说,在提供细粒度授权和安全建立新加密密钥方面仍然存在差距。我们提出了一种运行在OAuth授权体系结构之上的机制,并使用基于nonce的协议在以前未知的各方之间提供新的经过身份验证的对称加密材料的引导。我们建立了一个能量测量平台来评估我们的建议,并将其与现有工作进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信