2015
DOI: 10.1145/2829988.2790021
|View full text |Cite
|
Sign up to set email alerts
|

Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

Abstract: Authentication of smart objects is a major challenge for the Internet of Things (IoT), and has been left open in DTLS. Leveraging locally managed IPv6 addresses with identitybased cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deploymentfriendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). Our early results demonstrate feasibility and promise efficiency after ong… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The research introduced Identity-based Cryptography (IBC) and Elliptical Curve Cryptography (ECC) for end-to-end authentication. Asymmetric cryptography for end-to-end encryption (Markmann, Schmidt & Wählisch, 2015). Integrating Ciphering and Physical Authentication schemes is suggested for additional security, and 3rd-factor authentication Delegation-based IoT authentication is proposed in (Borgohain et al, 2015) to resolve privacy concerns in IoT.…”
Section: Related Workmentioning
confidence: 99%
“…The research introduced Identity-based Cryptography (IBC) and Elliptical Curve Cryptography (ECC) for end-to-end authentication. Asymmetric cryptography for end-to-end encryption (Markmann, Schmidt & Wählisch, 2015). Integrating Ciphering and Physical Authentication schemes is suggested for additional security, and 3rd-factor authentication Delegation-based IoT authentication is proposed in (Borgohain et al, 2015) to resolve privacy concerns in IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Although desirable, mutual authentication comes at a cost in terms of overhead and computational complexity, which generally result in higher energy consumption. For this reason, much effort has been devoted to the design of lightweight and effective algorithms, such as [71][72][73][74][75]. For example, in [74] the authors exploits CoAP to design a mutual payload-based authentication scheme which replaces the native DTLS security framework with a lowercomplexity authentication mechanism.…”
Section: A Iot Device Identification and Authenticationmentioning
confidence: 99%
“…Table 1 lists possible schemes for IoT devices to identify smartphones. First, after verifying the identities of smartphone users, the Internet server can generate credentials based on the identification information of smartphones [ 20 ]. Therefore, an IoT device can restrict access so only the smartphone with the specified identification information can use associated credentials to connect to the device.…”
Section: The Generalized Requirementsmentioning
confidence: 99%