首页> 外文期刊>Computer networks >Authenticated key establishment for low-resource devices exploiting correlated random channels
【24h】

Authenticated key establishment for low-resource devices exploiting correlated random channels

机译:利用相关随机通道的低资源设备的认证密钥建立

获取原文
获取原文并翻译 | 示例

摘要

Authenticated key establishment is a central requirement for securing loT devices. For efficiency and management reasons, it might be desirable to avoid public-key-based solutions that are ubiquitous in traditional Internet settings but have many drawbacks for resource-constrained (RC) nodes. We introduce a novel Vicinity-based Pairing (VP) mechanism that allows authenticating arbitrary 'unloaded' RC-nodes by delegating trust from already authenticated and secured, we call it 'loaded', RC-nodes. For authenticating RC-nodes, VP exploits the correlation between channel profiles from devices that are in close physical proximity. In our setting, only devices that are within a few centimetres from the 'loaded' RC nodes are authenticated after a user initiates such a process. Subsequently, the embedded end device can extract an unique shared symmetric key with another device such as a SCADA gateway, again by exploiting channel parameters. Based on extensive experiments, we propose new techniques for extracting time-varying randomness from channel parameters for use in VP. We describe the first MITM-resistant device pairing protocol purely based on a single wireless interface with an extensive adversarial model and protocol analysis. We show that existing wireless devices can be retro-fitted with the VP protocol via software updates, i.e. without changes to the hardware. linplementation results of our embedded prototype demonstrates that the approach has the potential to dramatically reduce the cost and efforts of securing low-resource devices that are common in the IoT. (C) 2016 Elsevier B.V. All rights reserved.
机译:身份验证密钥的建立是确保loT设备安全的核心要求。出于效率和管理方面的原因,可能希望避免在传统Internet设置中普遍存在但对资源受限(RC)节点有很多缺点的基于公钥的解决方案。我们引入了一种新颖的基于邻近性的配对(VP)机制,该机制允许通过从已经过身份验证和保护的代理(我们称为“已加载”的RC节点)中委派信任来认证任意“未加载”的RC节点。为了验证RC节点,VP利用了物理上接近的设备的通道配置文件之间的相关性。在我们的设置中,只有在用户启动此过程后,才对距离“已加载” RC节点只有几厘米的设备进行身份验证。随后,嵌入式终端设备可以再次利用信道参数,与另一个设备(例如SCADA网关)提取唯一的共享对称密钥。基于广泛的实验,我们提出了一种新的技术,用于从信道参数中提取随时间变化的随机性以用于VP。我们仅基于具有广泛对抗模型和协议分析的单个无线接口来描述第一个抗MITM的设备配对协议。我们展示了可以通过软件更新来对现有无线设备进行VP协议的改装,即无需更改硬件。我们的嵌入式原型的分解结果表明,该方法具有极大地降低成本和保护物联网中常见的低资源设备的工作量的潜力。 (C)2016 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号