Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu
{"title":"A dynamic identity end-to-end authentication key exchange protocol for IoT environments","authors":"Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu","doi":"10.1109/ICDIM.2017.8244673","DOIUrl":null,"url":null,"abstract":"Wearable devices are the most frequently used personal devices, in ail of wearable devices, the smart phones are the most popular and rapid development. The evolution of wearable devices such as smartphones will accelerate the development of Internet of Things (IoT). Furthermore, user can use the IoT services easily through the smartphone or wearing device. However, if the communication between the wearable device and other devices does not have enough access control and information protect, it may cause some problems, such as the data may be stolen and modified. In this paper, we presented an end-to-end authenticated key exchange agreement for wearable devices in IoT environments. The protocol can satisfy some properties of key exchange agreement and be used with wearable devices in IoT environments.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2017.8244673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Wearable devices are the most frequently used personal devices, in ail of wearable devices, the smart phones are the most popular and rapid development. The evolution of wearable devices such as smartphones will accelerate the development of Internet of Things (IoT). Furthermore, user can use the IoT services easily through the smartphone or wearing device. However, if the communication between the wearable device and other devices does not have enough access control and information protect, it may cause some problems, such as the data may be stolen and modified. In this paper, we presented an end-to-end authenticated key exchange agreement for wearable devices in IoT environments. The protocol can satisfy some properties of key exchange agreement and be used with wearable devices in IoT environments.