Schmitt et al., 2016 - Google Patents
TinyTO: Two-way authentication for constrained devices in the Internet of ThingsSchmitt et al., 2016
- Document ID
- 8813624515421171330
- Author
- Schmitt C
- Noack M
- Stiller B
- Publication year
- Publication venue
- Internet of Things
External Links
Snippet
Wireless sensor networks (WSN) will play a fundamental role in the future Internet of Things (IoT), with millions of devices actively exchanging confidential information with one another in a multi-hop manner. Ensuring secure end-to-end communication channels is crucial to the …
- 238000004891 communication 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sciancalepore et al. | Public key authentication and key agreement in IoT devices with minimal airtime consumption | |
Hellaoui et al. | Energy-efficient mechanisms in security of the internet of things: A survey | |
US8254581B2 (en) | Lightweight key distribution and management method for sensor networks | |
Sahraoui et al. | Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things | |
Schmitt et al. | TinyTO: Two-way authentication for constrained devices in the Internet of Things | |
Yu et al. | Enabling end-to-end secure communication between wireless sensor networks and the Internet | |
JP7551080B2 (en) | Method and architecture for securing and managing a network of embedded systems with an optimized public key infrastructure - Patents.com | |
Lavanya et al. | Lightweight key agreement protocol for IoT based on IKEv2 | |
Nyangaresi et al. | Privacy preservation protocol for smart grid networks | |
Tian et al. | Analysis and improvement of an authenticated key exchange protocol for sensor networks | |
Sahraoui et al. | Compressed and distributed host identity protocol for end-to-end security in the IoT | |
Ben‐Othman et al. | IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s | |
Garcia-Morchon et al. | A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO | |
Melki et al. | Lightweight and secure D2D authentication & key management based on PLS | |
Benslimane et al. | Efficient end-to-end secure key management protocol for internet of things | |
Schmitt et al. | Two-way authentication for the internet-of-things | |
Noack | Optimization of two-way authentication protocol in internet of things | |
Kasyoka et al. | Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography | |
Büttner et al. | Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks | |
Porambage et al. | Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks | |
Singh et al. | Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity | |
Komninos et al. | Authentication in a layered security approach for mobile ad hoc networks | |
Ambareen et al. | LEES: a hybrid lightweight elliptic ElGamal-Schnorr-based cryptography for secure D2D communications | |
Bortnik et al. | Secured by hardware client-server communication based on NB-IoT technology | |
Padmashree et al. | HPAKE: Hybrid precocious authentication and key establishment in IoT |