Collaborative and verifiable key derivation protocol for smart home security: CV-KDP

Abstract

The ciphertext policy is a promising cryptographic technique for smart home data security, and the secrecy of the encryption key purely depends on the security of the key derivation mechanism. In a smart home network, many devices have limited computational and communication resources, and any such mechanism to create a security key should consider these computational and communicational constraints. In this paper, we propose a collaborative and verifiable key derivation protocol based on elliptic curve cryptography for smart home security. Our construction realizes a distributed computation of the security key without adding any extra energy consumption. The proposed collaborative mechanism effectively solves not only the key derivation mechanism security issue, but also adds a verifiability function to avoid keys falsification. Meanwhile, it helps markedly reduce the key derivation overhead at the energy constrained device. A comparison with other collaborative and non collaborative key derivation schemes, demonstrates that our scheme has somewhat better performance in terms of energy overhead at the constrained device side. Also, we provide proof of security of the proposed protocol.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

References

  1. 1.

    Naoui S, Elhdhili ME, Saidane LA (2019) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J Netw Syst Manag. https://doi.org/10.1007/s10922-019-09496-x

    Article  Google Scholar 

  2. 2.

    Naoui S, Elhdhili ME, Saidane LA (2017) Trusted third party based key management for enhancing LoRaWAN security. In: IEEE/ACS 14th international conference on computer systems and applications (AICCSA). IEEE. https://doi.org/10.1109/AICCSA.2017.73

  3. 3.

    Mungara R, Venkateswararao K, Pallamreddy V (2011) A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. Int J Comput Technol Appl 2(5):1690–1696

    Google Scholar 

  4. 4.

    Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE international conference on pervasive computing and communications. IEEE. https://doi.org/10.1109/PERCOM.2005.18

  5. 5.

    Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International workshop on cryptographic hardware and embedded systems. Springer. https://doi.org/10.1007/978-3-540-28632-5_9

  6. 6.

    Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: First annual IEEE communications society conference on sensor and ad hoc communications and networks. IEEE SECON. https://doi.org/10.1109/SAHCN.2004.1381904

  7. 7.

    Yosra BS, Alexis O, Djamal Z, Laurent M (2014) Lightweight collaborative key establishment scheme for the Internet of Things. Comput Netw 64:273–295. https://doi.org/10.1016/j.comnet.2014.02.001

    Article  Google Scholar 

  8. 8.

    Porambage P, Braeken An, Kumar P, Gurtov A, Ylianttila M (2015) Proxy-based end-to-end key establishment protocol for the Internet of Things. In: IEEE international conference on communication workshop (ICCW). IEEE. https://doi.org/10.1109/ICCW.2015.7247583

  9. 9.

    Porambage P, An Braeken, Kumar P, Gurtov A, Ylianttila M (2017) CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things. Wirel Pers Commun 96:421–440. https://doi.org/10.1007/s11277-017-4176-5

    Article  Google Scholar 

  10. 10.

    Naoui S, Elhdhili ME, Saidane LA (2017) Lightweight enhanced collaborative key management scheme for smart home application. In: International conference on high performance computing and simulation (HPCS), 2017. IEEE. https://doi.org/10.1109/HPCS.2017.117

  11. 11.

    Brachmann M, Keoh S L, Morchon O G, Kumare S S (2012) End-to-end transport security in the IP-based Internet of Things. In: 21st international conference on computer communications and networks (ICCCN). IEEE. https://doi.org/10.1109/ICCCN.2012.6289292

  12. 12.

    Zhou L, Chao HC (2011) Multimedia traffic security architecture for the Internet of Things. IEEE Netw 25:35–40. https://doi.org/10.1109/MNET.2011.5772059

    Article  Google Scholar 

  13. 13.

    Kaufman C (2004) Internet key exchange (IKEv2) protocol. https://tools.ietf.org/html/draft-ietf-ipsec-ikev2-17. Accessed 12 Oct 2017

  14. 14.

    Kaufman C (2011) A TLS/DTLS 1.2 profile for the Internet of Things. https://tools.ietf.org/id/draft-ietf-dice-profile-07.html. Accessed 12 Oct 2017

  15. 15.

    Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw 32:17–31. https://doi.org/10.1016/j.adhoc.2015.01.006

    Article  Google Scholar 

  16. 16.

    Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654. https://doi.org/10.1109/TIT.1976.1055638

    Article  Google Scholar 

  17. 17.

    Hong H, Liu X, Sun Z (2018) A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1102-3

    Article  Google Scholar 

  18. 18.

    Hong H, Sun Z (2018) Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. World Wide Web 21:595–607. https://doi.org/10.1007/s11280-017-0475-8

    Article  Google Scholar 

  19. 19.

    Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tools Appl 77:4477–4490. https://doi.org/10.1007/s11042-017-4804-9

    Article  Google Scholar 

  20. 20.

    Roman R, Alcaraz C, Lopez J, Sklavosb N (2011) Key management systems for sensor networks in the context of the Internet of Things. Comput Electr Eng 37:147–159. https://doi.org/10.1016/j.compeleceng.2011.01.009

    Article  Google Scholar 

  21. 21.

    Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sens Netw 10:357–430. https://doi.org/10.1155/2014/357430

    Article  Google Scholar 

  22. 22.

    Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE wireless communications and networking conference (WCNC). IEEE. https://doi.org/10.1109/WCNC.2014.6952860

  23. 23.

    Chen Y, Luo B (2012) S2a: secure smart household appliances. In: CODASPY ’12 proceedings of the second ACM conference on data and application security and privacy. IEEE. https://doi.org/10.1145/2133601.2133628

  24. 24.

    Vaidya B, Makrakis D, Mouftah HT (2011) Device authentication mechanism for smart energy home area networks. In: IEEE international conference on consumer electronics (ICCE). IEEE. https://doi.org/10.1109/ICCE.2011.57228648

  25. 25.

    Han K, Kim J, Shon T, Ko D (2013) A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers Ubiquitous Comput 17:945–949. https://doi.org/10.1007/s00779-012-0541-2

    Article  Google Scholar 

  26. 26.

    Li Y (2013) Design of a key establishment protocol for smart home energy management system. In: Fifth international conference on computational intelligence, communication systems and networks. IEEE. https://doi.org/10.1109/CICSYN.2013.42

  27. 27.

    Cremers Cas J F (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer. https://doi.org/10.1007/978-3-540-70545-1_38

  28. 28.

    Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: 2nd international conference on privacy enhancing technologies. Springer

  29. 29.

    Wei D (2010) Crypto++ library. https://www.cryptopp.com/downloads.html. Accessed 12 Oct 2017

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Sarra Naoui.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Naoui, S., Elhdhili, M.E. & Saidane, L.A. Collaborative and verifiable key derivation protocol for smart home security: CV-KDP. Inf Technol Manag 21, 115–129 (2020). https://doi.org/10.1007/s10799-019-00307-y

Download citation

Keywords

  • Smart home
  • Key derivation
  • Privacy
  • Collaborative protocol
  • Verifiability