使用基于身份的密码系统保护智能家庭通信的一种简单有效的方法

M. M. Rathore, Sushil S. Chaurasia, Dhirendra Shukla, Elmahdi Bentafat
{"title":"使用基于身份的密码系统保护智能家庭通信的一种简单有效的方法","authors":"M. M. Rathore, Sushil S. Chaurasia, Dhirendra Shukla, Elmahdi Bentafat","doi":"10.23919/FRUCT56874.2022.9953822","DOIUrl":null,"url":null,"abstract":"With the growing practical implementation of smart home, the attacks on smart homes are proportionally increasing. Residents can only be benefited from smart home technology if they and their home-assets are secured against cyber-attacks. A number of PKI-based communication security models have been proposed for data authentication and confidentiality in smart homes. However, it is not convenient for a home device with the limited capacity to store, verify, and manage public keys (certificates) of all other devices. Identity-based cryptography (IBC) is one of the asymmetric cryptographic solutions that does not require certificates. However, due to the central storage of the secret at the key generation center (KGC), the security fully relies on the KGC in IBC environment. Thus, to resolve these issues while providing the security to smart homes, in this paper, we proposed a straightforward and light-weight security model based on IBC, wheel pairing, and elliptic curves. The proposed model performs distributed key generation where the main secret is generated by all participating home devices, instead of a central KGC. We designed a complete protocol, which illuminates the fundamental steps of new device enrollment, distributed key generation, device to device encryption, data integrity, and entity authentication. Moreover, the commitment procedure is introduced that ensures no party can change its partial-secret after he has committed to it. The elliptic curve cryptography (ECC) based Diffie-Hellman (DH) model is deployed for session key generation for device to device data encryption, whereas IBC-based private key is used for signatures. Finally, the feasibility of the model is evaluated by implementing the system on various numbers of IoT machines, while considering them as home devices. Also, the security of the proposed model is verified technically and formally by a software verification tool called Automated Validation of Internet Security Protocols and Applications (AVISPA) against popular known attacks.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Straightforward and Efficient Approach to Secure Smart Home Communication using Identify-Based Cryptosystems\",\"authors\":\"M. M. Rathore, Sushil S. Chaurasia, Dhirendra Shukla, Elmahdi Bentafat\",\"doi\":\"10.23919/FRUCT56874.2022.9953822\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing practical implementation of smart home, the attacks on smart homes are proportionally increasing. Residents can only be benefited from smart home technology if they and their home-assets are secured against cyber-attacks. A number of PKI-based communication security models have been proposed for data authentication and confidentiality in smart homes. However, it is not convenient for a home device with the limited capacity to store, verify, and manage public keys (certificates) of all other devices. Identity-based cryptography (IBC) is one of the asymmetric cryptographic solutions that does not require certificates. However, due to the central storage of the secret at the key generation center (KGC), the security fully relies on the KGC in IBC environment. Thus, to resolve these issues while providing the security to smart homes, in this paper, we proposed a straightforward and light-weight security model based on IBC, wheel pairing, and elliptic curves. The proposed model performs distributed key generation where the main secret is generated by all participating home devices, instead of a central KGC. We designed a complete protocol, which illuminates the fundamental steps of new device enrollment, distributed key generation, device to device encryption, data integrity, and entity authentication. Moreover, the commitment procedure is introduced that ensures no party can change its partial-secret after he has committed to it. The elliptic curve cryptography (ECC) based Diffie-Hellman (DH) model is deployed for session key generation for device to device data encryption, whereas IBC-based private key is used for signatures. Finally, the feasibility of the model is evaluated by implementing the system on various numbers of IoT machines, while considering them as home devices. Also, the security of the proposed model is verified technically and formally by a software verification tool called Automated Validation of Internet Security Protocols and Applications (AVISPA) against popular known attacks.\",\"PeriodicalId\":274664,\"journal\":{\"name\":\"2022 32nd Conference of Open Innovations Association (FRUCT)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 32nd Conference of Open Innovations Association (FRUCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/FRUCT56874.2022.9953822\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT56874.2022.9953822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着智能家居的日益实际实施,对智能家居的攻击也成比例地增加。只有当居民和他们的家庭资产免受网络攻击时,他们才能从智能家居技术中受益。许多基于pki的通信安全模型已经被提出用于智能家居中的数据认证和机密性。但是,对于容量有限的家用设备来说,存储、验证和管理所有其他设备的公钥(证书)并不方便。基于身份的加密(IBC)是一种不需要证书的非对称加密解决方案。但是,由于密钥集中存储在密钥生成中心(KGC),因此IBC环境下的安全性完全依赖于KGC。因此,为了在保证智能家居安全的同时解决这些问题,本文提出了一种基于IBC、轮对和椭圆曲线的简单轻量级安全模型。提出的模型执行分布式密钥生成,其中主密钥由所有参与的家庭设备生成,而不是中央KGC。我们设计了一个完整的协议,阐明了新设备注册、分布式密钥生成、设备到设备加密、数据完整性和实体身份验证的基本步骤。此外,还引入了承诺程序,确保当事人在承诺后不能更改其部分秘密。设备间数据加密采用基于椭圆曲线加密的DH (Diffie-Hellman)模型生成会话密钥,签名采用基于ibc的私钥。最后,通过在不同数量的物联网机器上实施系统来评估模型的可行性,同时将它们视为家庭设备。此外,提出的模型的安全性通过称为互联网安全协议和应用程序自动验证(AVISPA)的软件验证工具在技术上和形式上进行了验证,以防止流行的已知攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Straightforward and Efficient Approach to Secure Smart Home Communication using Identify-Based Cryptosystems
With the growing practical implementation of smart home, the attacks on smart homes are proportionally increasing. Residents can only be benefited from smart home technology if they and their home-assets are secured against cyber-attacks. A number of PKI-based communication security models have been proposed for data authentication and confidentiality in smart homes. However, it is not convenient for a home device with the limited capacity to store, verify, and manage public keys (certificates) of all other devices. Identity-based cryptography (IBC) is one of the asymmetric cryptographic solutions that does not require certificates. However, due to the central storage of the secret at the key generation center (KGC), the security fully relies on the KGC in IBC environment. Thus, to resolve these issues while providing the security to smart homes, in this paper, we proposed a straightforward and light-weight security model based on IBC, wheel pairing, and elliptic curves. The proposed model performs distributed key generation where the main secret is generated by all participating home devices, instead of a central KGC. We designed a complete protocol, which illuminates the fundamental steps of new device enrollment, distributed key generation, device to device encryption, data integrity, and entity authentication. Moreover, the commitment procedure is introduced that ensures no party can change its partial-secret after he has committed to it. The elliptic curve cryptography (ECC) based Diffie-Hellman (DH) model is deployed for session key generation for device to device data encryption, whereas IBC-based private key is used for signatures. Finally, the feasibility of the model is evaluated by implementing the system on various numbers of IoT machines, while considering them as home devices. Also, the security of the proposed model is verified technically and formally by a software verification tool called Automated Validation of Internet Security Protocols and Applications (AVISPA) against popular known attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信