Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm

Jatin Arora, Kamal Saluja, S. Gupta, Suvarna Sharma, Gaganpreet Kaur
{"title":"Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm","authors":"Jatin Arora, Kamal Saluja, S. Gupta, Suvarna Sharma, Gaganpreet Kaur","doi":"10.1109/ICCES57224.2023.10192607","DOIUrl":null,"url":null,"abstract":"A collection of connected things or nodes that collect information and send it through communication channels is known as the Internet of Things (IoT). Maintaining the confidentiality and integrity of the transferred data is crucial in many applications. As a result, protection of private data from security risks is a top priority for IoT based applications. IoT objects are typically energy-constrained computing and storage devices. Therefore, during the communication of devices, authentication among devices is necessary. A public-private key is created and utilized for the duration of the session without taking into account the possibility of loss to an adversary. Once the key has been compromised, there is no way to know when it has been lost, and the attacker can read every message. This severe security lapse went on for a longer period of time undiscovered. Revoking the key and creating a new key, which is not advised to do frequently, is the only defense against this security breach. An alternative solution to this problem is deriving a new key at communicating sites rather than exchanging keys among them. The performance of the key-sharing algorithm to perform the key exchange is measured based on the time required to encrypt/decrypt and derive the key at the node.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES57224.2023.10192607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A collection of connected things or nodes that collect information and send it through communication channels is known as the Internet of Things (IoT). Maintaining the confidentiality and integrity of the transferred data is crucial in many applications. As a result, protection of private data from security risks is a top priority for IoT based applications. IoT objects are typically energy-constrained computing and storage devices. Therefore, during the communication of devices, authentication among devices is necessary. A public-private key is created and utilized for the duration of the session without taking into account the possibility of loss to an adversary. Once the key has been compromised, there is no way to know when it has been lost, and the attacker can read every message. This severe security lapse went on for a longer period of time undiscovered. Revoking the key and creating a new key, which is not advised to do frequently, is the only defense against this security breach. An alternative solution to this problem is deriving a new key at communicating sites rather than exchanging keys among them. The performance of the key-sharing algorithm to perform the key exchange is measured based on the time required to encrypt/decrypt and derive the key at the node.
基于Diffie-Hellman算法的多重非对称密钥泄露处理
收集信息并通过通信渠道发送信息的连接物或节点的集合被称为物联网(IoT)。在许多应用程序中,维护传输数据的机密性和完整性至关重要。因此,保护私人数据免受安全风险是基于物联网的应用程序的首要任务。物联网对象通常是能量受限的计算和存储设备。因此,在设备之间进行通信时,需要进行设备间的认证。在会话期间创建并使用公钥和私钥,而不考虑将密钥丢失给对手的可能性。一旦密钥被泄露,就无法知道它何时丢失,攻击者可以读取每条消息。这种严重的安全漏洞持续了很长一段时间而未被发现。撤销密钥并创建一个新密钥(不建议经常这样做)是防止这种安全漏洞的唯一方法。这个问题的另一种解决方案是在通信站点上获得一个新密钥,而不是在它们之间交换密钥。执行密钥交换的密钥共享算法的性能是根据在节点上加密/解密和导出密钥所需的时间来衡量的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信