{"title":"Bootstrapping IoT authentication using aggregated local knowledge and novel self-contained triangulation methodologies","authors":"C. Autry, A. W. Roscoe, Mykhailo Magal","doi":"10.1109/STC55697.2022.00022","DOIUrl":null,"url":null,"abstract":"We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed and evaluated. The value of authentication along multiple disjoint paths becomes very clear. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another then the length of the authentication paths is of little importance.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 29th Annual Software Technology Conference (STC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STC55697.2022.00022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed and evaluated. The value of authentication along multiple disjoint paths becomes very clear. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another then the length of the authentication paths is of little importance.