[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Schmitt et al., 2016 - Google Patents

TinyTO: Two-way authentication for constrained devices in the Internet of Things

Schmitt et al., 2016

Document ID
8813624515421171330
Author
Schmitt C
Noack M
Stiller B
Publication year
Publication venue
Internet of Things

External Links

Snippet

Wireless sensor networks (WSN) will play a fundamental role in the future Internet of Things (IoT), with millions of devices actively exchanging confidential information with one another in a multi-hop manner. Ensuring secure end-to-end communication channels is crucial to the …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Similar Documents

Publication Publication Date Title
Sciancalepore et al. Public key authentication and key agreement in IoT devices with minimal airtime consumption
Hellaoui et al. Energy-efficient mechanisms in security of the internet of things: A survey
US8254581B2 (en) Lightweight key distribution and management method for sensor networks
Sahraoui et al. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
Schmitt et al. TinyTO: Two-way authentication for constrained devices in the Internet of Things
Yu et al. Enabling end-to-end secure communication between wireless sensor networks and the Internet
JP7551080B2 (en) Method and architecture for securing and managing a network of embedded systems with an optimized public key infrastructure - Patents.com
Lavanya et al. Lightweight key agreement protocol for IoT based on IKEv2
Nyangaresi et al. Privacy preservation protocol for smart grid networks
Tian et al. Analysis and improvement of an authenticated key exchange protocol for sensor networks
Sahraoui et al. Compressed and distributed host identity protocol for end-to-end security in the IoT
Ben‐Othman et al. IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s
Garcia-Morchon et al. A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Melki et al. Lightweight and secure D2D authentication & key management based on PLS
Benslimane et al. Efficient end-to-end secure key management protocol for internet of things
Schmitt et al. Two-way authentication for the internet-of-things
Noack Optimization of two-way authentication protocol in internet of things
Kasyoka et al. Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
Büttner et al. Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks
Porambage et al. Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks
Singh et al. Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity
Komninos et al. Authentication in a layered security approach for mobile ad hoc networks
Ambareen et al. LEES: a hybrid lightweight elliptic ElGamal-Schnorr-based cryptography for secure D2D communications
Bortnik et al. Secured by hardware client-server communication based on NB-IoT technology
Padmashree et al. HPAKE: Hybrid precocious authentication and key establishment in IoT