{"title":"使用无证书公钥加密的物联网智能环境相互认证","authors":"Dania Qara Bala, Soumyadev Maity, S. K. Jena","doi":"10.1109/SSPS.2017.8071559","DOIUrl":null,"url":null,"abstract":"Key management and authentication play an important role in ensuring secure communication in Internet of Things (IoT). Traditional key management protocols cannot be used in IoT because of its discriminating characteristics. Mutual authentication between a resource constrained sensor node inside a smart environment and a remote end-user is a challenging task in IoT authentication. In this paper, we propose a novel protocol for this purpose which eliminates the use of certificate management by making use of the certificate-less public-key cryptography (CL-PKC) technique. Moreover, we do not require the resource constrained sensor nodes to execute public key cryptography. Our proposed protocol is secure against node impersonation attack and replay attack.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Mutual authentication for IoT smart environment using certificate-less public key cryptography\",\"authors\":\"Dania Qara Bala, Soumyadev Maity, S. K. Jena\",\"doi\":\"10.1109/SSPS.2017.8071559\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Key management and authentication play an important role in ensuring secure communication in Internet of Things (IoT). Traditional key management protocols cannot be used in IoT because of its discriminating characteristics. Mutual authentication between a resource constrained sensor node inside a smart environment and a remote end-user is a challenging task in IoT authentication. In this paper, we propose a novel protocol for this purpose which eliminates the use of certificate management by making use of the certificate-less public-key cryptography (CL-PKC) technique. Moreover, we do not require the resource constrained sensor nodes to execute public key cryptography. Our proposed protocol is secure against node impersonation attack and replay attack.\",\"PeriodicalId\":382353,\"journal\":{\"name\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSPS.2017.8071559\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071559","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mutual authentication for IoT smart environment using certificate-less public key cryptography
Key management and authentication play an important role in ensuring secure communication in Internet of Things (IoT). Traditional key management protocols cannot be used in IoT because of its discriminating characteristics. Mutual authentication between a resource constrained sensor node inside a smart environment and a remote end-user is a challenging task in IoT authentication. In this paper, we propose a novel protocol for this purpose which eliminates the use of certificate management by making use of the certificate-less public-key cryptography (CL-PKC) technique. Moreover, we do not require the resource constrained sensor nodes to execute public key cryptography. Our proposed protocol is secure against node impersonation attack and replay attack.