[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2070425.2070473acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Microcontroller-based implementation of parsekey+ for limited resources embedded applications

Published: 14 November 2011 Publication History

Abstract

ParseKey+ is an approach to a new highly secure and safe authentication service. The scheme provides secure authentication process for both server and client sides. It employs hash to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of the sub-keys hidden inside ParseKey+ file. The ParseKey+ file itself is also encrypted by the password of the other party in authentication service using a symmetric encryption method. We wish to implement the ParseKey+ authentication system with limited resources on AVR microcontrollers. More sophisticated versions of these families of microcontrollers are widely used in PDAs, new generation of mobile phones and various embedded devices. Implementation of ParseKey+ allows securing Internet communication and transactions on above-mentioned devices in addition to providing a highly secure mechanism for implementing very low-cost hardware USB keys for online banking applications.

References

[1]
Elci.A, Rahnama.B and Amintabar.A, "Tracking Reported Vehicles in Traffic Management and Information System using Intelligent Junctions," Vehicular Wireless Networks and Vehicular Intelligent Transportation Systems, Journal of Information Science and Engineering, pp. 883--896, 2010.
[2]
President's Information Technology Advisory Committee. Cyber Security. Retrived on September 2010 http://www.itrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf.
[3]
Rahnama.B, Elci.A, "Considerations on a new Software Architecture for Distributed Environments using Autonomous Semantic Agents," in Compsac 29, Edinburgh, UK, 2005, pp. 133--138.
[4]
Prepared by the office of the manager, public switched network security assessment guidelines.: Diane publishing, 2002.
[5]
Hallam-Baker.J, Hostetler.P, Lawrence.J, Leach.S, Luotonen.P, Stewart.A, Franks.L, "HTTP Authentication: Basic and Digest Access Authentication," ITEF, 1999.
[6]
Metz.N, Nesser.C, Straw.P, Haller.M, "A One-Time Password System," IETF, pp. 2--4, 1998.
[7]
Atmel products. Retrived on November 2010. http://www.atmel.com/dyn/resources/prod_documents/7766S.pdf
[8]
Litwin.E, "Cryptography," International Journal of Potentials, pp. 36--38, 2001.
[9]
Elçi.A, Rahnama.B, "ParseKey+: a Five-Way Strong Authentication Procedure as an Approach to Client/Server Impersonation Avoidance Using Steganography for Key Encryption," in International Conference on Security and Management (SAM'07), 2007, pp. 25--28.
[10]
ATmega32u4 datasheet. Retrived on December 2010. http://www.atmel.com/products/avr/default.asp?family_id=607&source=global_nav
[11]
Atmel Comparison table. Retrived on December 2010. http://www.atmel.com/dyn/products/product_card.asp?part_id=4317
[12]
Krishnan.R, "Future of Embedded Systems Technology," in Technical Report GB-IFT016B, BCC Research, 2005.
[13]
Tennenhouse.D, "Proactive Computing," in Communications of the ACM, 2000, pp. 43--50.
[14]
Bouganim.L, Pucheral.P, Anciaux.N, "Smart Card DBMS: where are we now? Technical Report 80840," 2006.
[15]
Ganesan.D, Mathur.G, Shenoy.P,Diao.Y, "Rethinking Data Management for Storage centric Sensor Networks," in In Proceedings of the Conference on Innovative Data Systems Research (CIDR), 2007, pp. 22--31.
[16]
Lal.A, Leung.C, Pham.T, Karlsson.J, "IBM DB2 Everyplace: A Small Footprint Relational Database System," in In Proceedings of the International Conference on Data Engineering (ICDE), 2001, pp. 230--232.
[17]
Baek.S, Lee.H, Joe.M, Kim.J, "LGeDBMS: a Small DBMS for Embedded System with Flash Memory.," in In Proceedings of the International Conference on Very Large Data Bases (VLDB), 2006, pp. 1255--1258.
[18]
Franklin.M, Hellerstein.J, Hong.W, Madden.S, "TinyDB: An Acquisitional Query Processing System for Sensor Networks," ACM Transactions on Database Systems (TODS, pp. 122--173, 2005.
[19]
Teensy2 solution. Retrived on October 2010. http://www.pjrc.com/store/teensy.html
[20]
Stallings.W, Network security essentials.: Prentice Hall, 2003.

Index Terms

  1. Microcontroller-based implementation of parsekey+ for limited resources embedded applications

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '11: Proceedings of the 4th international conference on Security of information and networks
    November 2011
    276 pages
    ISBN:9781450310208
    DOI:10.1145/2070425
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • SDU: Suleyman Demirel University
    • AOARD: Asian Office of Aerospace Research and Development
    • RDECOM: U.S. Army Research, Development and Engineering Command
    • US Army ITC-PAC Asian Research Office
    • AFOSR: AFOSR
    • ONRGlobal: U.S. Office of Naval Research Global
    • Macquarie University-Sydney

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. embedded system
    2. microcontroller-based authentication
    3. parsekey+

    Qualifiers

    • Short-paper

    Conference

    SIN 2011

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 90
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media