کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4954919 1364601 2016 26 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Authenticated key establishment for low-resource devices exploiting correlated random channels
ترجمه فارسی عنوان
تأیید اعتبار کلی برای دستگاه های کم منابع با بهره گیری از کانال های تصادفی مرتبط
کلمات کلیدی
توافق کلید معتبر از طریق کانال های بی سیم، نتایج تجربی، جفت شدن مبتنی بر نزدیکی، پیاده سازی جاسازی شده،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی
Authenticated key establishment is a central requirement for securing IoT devices. For efficiency and management reasons, it might be desirable to avoid public-key-based solutions that are ubiquitous in traditional Internet settings but have many drawbacks for resource-constrained (RC) nodes. We introduce a novel Vicinity-based Pairing (VP) mechanism that allows authenticating arbitrary 'unloaded' RC-nodes by delegating trust from already authenticated and secured, we call it 'loaded', RC-nodes. For authenticating RC-nodes, VP exploits the correlation between channel profiles from devices that are in close physical proximity. In our setting, only devices that are within a few centimetres from the 'loaded' RC-nodes are authenticated after a user initiates such a process. Subsequently, the embedded end device can extract an unique shared symmetric key with another device such as a SCADA gateway, again by exploiting channel parameters. Based on extensive experiments, we propose new techniques for extracting time-varying randomness from channel parameters for use in VP. We describe the first MITM-resistant device pairing protocol purely based on a single wireless interface with an extensive adversarial model and protocol analysis. We show that existing wireless devices can be retro-fitted with the VP protocol via software updates, i.e. without changes to the hardware. Implementation results of our embedded prototype demonstrates that the approach has the potential to dramatically reduce the cost and efforts of securing low-resource devices that are common in the IoT.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Networks - Volume 109, Part 1, 9 November 2016, Pages 105-123
نویسندگان
, , , , , ,