2020 IEEE 6th World Forum on Internet of Things (WF-IoT) 2020
DOI: 10.1109/wf-iot48130.2020.9221263
|View full text |Cite
|
Sign up to set email alerts
|

SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices

Abstract:  Users may download and print one copy of any publication from the public portal for the purpose of private study or research.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…IoT devices with limited processing power can use lightweight cryptography to encrypt their communications. Comparisons of NIST-defined LWC properties (cost, performance, and security) and discussions of different gaps and open research issues [127]. The literature study indicates that NIST has accredited PRESENT and CLEFIA block ciphers for cost-and securityrelated considerations.…”
Section: Discussionmentioning
confidence: 99%
“…IoT devices with limited processing power can use lightweight cryptography to encrypt their communications. Comparisons of NIST-defined LWC properties (cost, performance, and security) and discussions of different gaps and open research issues [127]. The literature study indicates that NIST has accredited PRESENT and CLEFIA block ciphers for cost-and securityrelated considerations.…”
Section: Discussionmentioning
confidence: 99%
“…• Resource-constrained -Most IoT devices, such as smart watches, CCTV cameras, and Bluetooth-operated devices, are resource constrained and heterogeneous, making it easier for attackers to target the system [27].…”
Section: This Paper Fl For Iot Malware Analysismentioning
confidence: 99%
“…Key amplification helps to increase the final key's randomness to eliminate the information leakage and increase entropy. Typically, two methods are used to combine keys generated from different segments and eliminate the correlation between them, bitwise XOR function [115]- [117] and hash function MD5 and SHA-256 [100], [101], [107], [108], [114], [131].…”
Section: E Key Amplificationmentioning
confidence: 99%