Haiku: Efficient Authenticated Key Agreement with Strong Security Guarantees for IoT

Abdulrahman Bin Rabiah, K. Ramakrishnan, Silas Richelson, A. Rabiah, Elizabeth Liri, K. Kar
{"title":"Haiku: Efficient Authenticated Key Agreement with Strong Security Guarantees for IoT","authors":"Abdulrahman Bin Rabiah, K. Ramakrishnan, Silas Richelson, A. Rabiah, Elizabeth Liri, K. Kar","doi":"10.1145/3427796.3427817","DOIUrl":null,"url":null,"abstract":"IoT devices often gather critical information that needs to be communicated in a secure manner. Authentication and secure communication in an IoT environment can be difficult because of constraints, in computing power, memory, energy and network connectivity. For secure communication with the rest of the network, an IoT device needs to trust the gateway through which it communicates, often over a wireless link. An IoT device needs a way of authenticating the gateway and vice-versa, to set up that secure channel. The protocol for authentication and key exchange needs to also work in situations where one or both parties lose connectivity with the outside of their network (e.g., infrastructure failure, intermittent connectivity to the rest of the network, to save cost or power). We propose a lightweight authentication and key exchange protocol for IoT environments that is tailored to handle IoT-imposed constraints. In our protocol, the gateway and IoT device communicate over an encrypted channel that uses a shared symmetric session key which changes periodically (every session) in order to ensure perfect forward secrecy (PFS). We combine both symmetric-key and public-key cryptography based authentication and key exchange, thus reducing the overhead of manual configuration. We leverage on the digital certificate signed by the manufacturer that is typically provided to each device. We study our proposed protocol, called Haiku, where keys are never exchanged over the network. We show that Haiku is lightweight and provides authentication, key exchange, confidentiality, and message integrity. Haiku does not need to contact a trusted third party (TTP), works in disconnected IoT environments, provides PFS, and is efficient in compute, memory and energy usage.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3427796.3427817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

IoT devices often gather critical information that needs to be communicated in a secure manner. Authentication and secure communication in an IoT environment can be difficult because of constraints, in computing power, memory, energy and network connectivity. For secure communication with the rest of the network, an IoT device needs to trust the gateway through which it communicates, often over a wireless link. An IoT device needs a way of authenticating the gateway and vice-versa, to set up that secure channel. The protocol for authentication and key exchange needs to also work in situations where one or both parties lose connectivity with the outside of their network (e.g., infrastructure failure, intermittent connectivity to the rest of the network, to save cost or power). We propose a lightweight authentication and key exchange protocol for IoT environments that is tailored to handle IoT-imposed constraints. In our protocol, the gateway and IoT device communicate over an encrypted channel that uses a shared symmetric session key which changes periodically (every session) in order to ensure perfect forward secrecy (PFS). We combine both symmetric-key and public-key cryptography based authentication and key exchange, thus reducing the overhead of manual configuration. We leverage on the digital certificate signed by the manufacturer that is typically provided to each device. We study our proposed protocol, called Haiku, where keys are never exchanged over the network. We show that Haiku is lightweight and provides authentication, key exchange, confidentiality, and message integrity. Haiku does not need to contact a trusted third party (TTP), works in disconnected IoT environments, provides PFS, and is efficient in compute, memory and energy usage.
俳句:高效的认证密钥协议,为物联网提供强大的安全保证
物联网设备经常收集需要以安全方式通信的关键信息。由于计算能力、内存、能源和网络连接方面的限制,物联网环境中的身份验证和安全通信可能很困难。为了与网络的其他部分进行安全通信,物联网设备需要信任其通信的网关,通常通过无线链路进行通信。物联网设备需要一种验证网关的方法,反之亦然,以建立安全通道。用于身份验证和密钥交换的协议还需要在一方或双方失去与网络外部的连接的情况下工作(例如,基础设施故障,与网络其余部分的间歇性连接,以节省成本或电力)。我们提出了一种针对物联网环境的轻量级身份验证和密钥交换协议,该协议专为处理物联网强加的约束而量身定制。在我们的协议中,网关和物联网设备通过加密通道进行通信,该通道使用共享对称会话密钥,该密钥定期(每次会话)更改,以确保完美的前向保密(PFS)。我们结合了基于对称密钥和公钥加密的身份验证和密钥交换,从而减少了手动配置的开销。我们利用通常提供给每个设备的制造商签名的数字证书。我们研究了我们提出的名为Haiku的协议,其中密钥永远不会在网络上交换。我们展示了Haiku是轻量级的,并提供身份验证、密钥交换、机密性和消息完整性。Haiku不需要联系受信任的第三方(TTP),在断开连接的物联网环境中工作,提供PFS,并且在计算,内存和能源使用方面效率很高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信