Jatin Arora, Kamal Saluja, S. Gupta, Suvarna Sharma, Gaganpreet Kaur
{"title":"Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm","authors":"Jatin Arora, Kamal Saluja, S. Gupta, Suvarna Sharma, Gaganpreet Kaur","doi":"10.1109/ICCES57224.2023.10192607","DOIUrl":null,"url":null,"abstract":"A collection of connected things or nodes that collect information and send it through communication channels is known as the Internet of Things (IoT). Maintaining the confidentiality and integrity of the transferred data is crucial in many applications. As a result, protection of private data from security risks is a top priority for IoT based applications. IoT objects are typically energy-constrained computing and storage devices. Therefore, during the communication of devices, authentication among devices is necessary. A public-private key is created and utilized for the duration of the session without taking into account the possibility of loss to an adversary. Once the key has been compromised, there is no way to know when it has been lost, and the attacker can read every message. This severe security lapse went on for a longer period of time undiscovered. Revoking the key and creating a new key, which is not advised to do frequently, is the only defense against this security breach. An alternative solution to this problem is deriving a new key at communicating sites rather than exchanging keys among them. The performance of the key-sharing algorithm to perform the key exchange is measured based on the time required to encrypt/decrypt and derive the key at the node.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES57224.2023.10192607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A collection of connected things or nodes that collect information and send it through communication channels is known as the Internet of Things (IoT). Maintaining the confidentiality and integrity of the transferred data is crucial in many applications. As a result, protection of private data from security risks is a top priority for IoT based applications. IoT objects are typically energy-constrained computing and storage devices. Therefore, during the communication of devices, authentication among devices is necessary. A public-private key is created and utilized for the duration of the session without taking into account the possibility of loss to an adversary. Once the key has been compromised, there is no way to know when it has been lost, and the attacker can read every message. This severe security lapse went on for a longer period of time undiscovered. Revoking the key and creating a new key, which is not advised to do frequently, is the only defense against this security breach. An alternative solution to this problem is deriving a new key at communicating sites rather than exchanging keys among them. The performance of the key-sharing algorithm to perform the key exchange is measured based on the time required to encrypt/decrypt and derive the key at the node.