Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4957348 | Pervasive and Mobile Computing | 2017 | 29 Pages |
Abstract
Recently, Kalra and Sood, and subsequently Chang et al. attempted to solve the authentication problem by proposing key agreement schemes for IoT devices. However, the security of their schemes were unproven. In this paper we demonstrate that these schemes are insecure. We extend upon their work to present a scheme that enables embedded devices to communicate securely with a server on an IoT network. We prove the security of this scheme using formal methods and demonstrate this under the intractability of some well-defined hard problems. We also discuss some practical aspects related to the implementation of the scheme.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu,