The ciphertext policy is a promising cryptographic technique for smart home data security, and the secrecy of the encryption key purely depends on the security of the key derivation mechanism. In a smart home network, many devices have limited computational and communication resources, and any such mechanism to create a security key should consider these computational and communicational constraints. In this paper, we propose a collaborative and verifiable key derivation protocol based on elliptic curve cryptography for smart home security. Our construction realizes a distributed computation of the security key without adding any extra energy consumption. The proposed collaborative mechanism effectively solves not only the key derivation mechanism security issue, but also adds a verifiability function to avoid keys falsification. Meanwhile, it helps markedly reduce the key derivation overhead at the energy constrained device. A comparison with other collaborative and non collaborative key derivation schemes, demonstrates that our scheme has somewhat better performance in terms of energy overhead at the constrained device side. Also, we provide proof of security of the proposed protocol.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Naoui S, Elhdhili ME, Saidane LA (2019) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J Netw Syst Manag. https://doi.org/10.1007/s10922-019-09496-x
Naoui S, Elhdhili ME, Saidane LA (2017) Trusted third party based key management for enhancing LoRaWAN security. In: IEEE/ACS 14th international conference on computer systems and applications (AICCSA). IEEE. https://doi.org/10.1109/AICCSA.2017.73
Mungara R, Venkateswararao K, Pallamreddy V (2011) A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. Int J Comput Technol Appl 2(5):1690–1696
Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE international conference on pervasive computing and communications. IEEE. https://doi.org/10.1109/PERCOM.2005.18
Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International workshop on cryptographic hardware and embedded systems. Springer. https://doi.org/10.1007/978-3-540-28632-5_9
Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: First annual IEEE communications society conference on sensor and ad hoc communications and networks. IEEE SECON. https://doi.org/10.1109/SAHCN.2004.1381904
Yosra BS, Alexis O, Djamal Z, Laurent M (2014) Lightweight collaborative key establishment scheme for the Internet of Things. Comput Netw 64:273–295. https://doi.org/10.1016/j.comnet.2014.02.001
Porambage P, Braeken An, Kumar P, Gurtov A, Ylianttila M (2015) Proxy-based end-to-end key establishment protocol for the Internet of Things. In: IEEE international conference on communication workshop (ICCW). IEEE. https://doi.org/10.1109/ICCW.2015.7247583
Porambage P, An Braeken, Kumar P, Gurtov A, Ylianttila M (2017) CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things. Wirel Pers Commun 96:421–440. https://doi.org/10.1007/s11277-017-4176-5
Naoui S, Elhdhili ME, Saidane LA (2017) Lightweight enhanced collaborative key management scheme for smart home application. In: International conference on high performance computing and simulation (HPCS), 2017. IEEE. https://doi.org/10.1109/HPCS.2017.117
Brachmann M, Keoh S L, Morchon O G, Kumare S S (2012) End-to-end transport security in the IP-based Internet of Things. In: 21st international conference on computer communications and networks (ICCCN). IEEE. https://doi.org/10.1109/ICCCN.2012.6289292
Zhou L, Chao HC (2011) Multimedia traffic security architecture for the Internet of Things. IEEE Netw 25:35–40. https://doi.org/10.1109/MNET.2011.5772059
Kaufman C (2004) Internet key exchange (IKEv2) protocol. https://tools.ietf.org/html/draft-ietf-ipsec-ikev2-17. Accessed 12 Oct 2017
Kaufman C (2011) A TLS/DTLS 1.2 profile for the Internet of Things. https://tools.ietf.org/id/draft-ietf-dice-profile-07.html. Accessed 12 Oct 2017
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw 32:17–31. https://doi.org/10.1016/j.adhoc.2015.01.006
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654. https://doi.org/10.1109/TIT.1976.1055638
Hong H, Liu X, Sun Z (2018) A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1102-3
Hong H, Sun Z (2018) Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. World Wide Web 21:595–607. https://doi.org/10.1007/s11280-017-0475-8
Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tools Appl 77:4477–4490. https://doi.org/10.1007/s11042-017-4804-9
Roman R, Alcaraz C, Lopez J, Sklavosb N (2011) Key management systems for sensor networks in the context of the Internet of Things. Comput Electr Eng 37:147–159. https://doi.org/10.1016/j.compeleceng.2011.01.009
Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sens Netw 10:357–430. https://doi.org/10.1155/2014/357430
Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE wireless communications and networking conference (WCNC). IEEE. https://doi.org/10.1109/WCNC.2014.6952860
Chen Y, Luo B (2012) S2a: secure smart household appliances. In: CODASPY ’12 proceedings of the second ACM conference on data and application security and privacy. IEEE. https://doi.org/10.1145/2133601.2133628
Vaidya B, Makrakis D, Mouftah HT (2011) Device authentication mechanism for smart energy home area networks. In: IEEE international conference on consumer electronics (ICCE). IEEE. https://doi.org/10.1109/ICCE.2011.57228648
Han K, Kim J, Shon T, Ko D (2013) A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers Ubiquitous Comput 17:945–949. https://doi.org/10.1007/s00779-012-0541-2
Li Y (2013) Design of a key establishment protocol for smart home energy management system. In: Fifth international conference on computational intelligence, communication systems and networks. IEEE. https://doi.org/10.1109/CICSYN.2013.42
Cremers Cas J F (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer. https://doi.org/10.1007/978-3-540-70545-1_38
Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: 2nd international conference on privacy enhancing technologies. Springer
Wei D (2010) Crypto++ library. https://www.cryptopp.com/downloads.html. Accessed 12 Oct 2017
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Naoui, S., Elhdhili, M.E. & Saidane, L.A. Collaborative and verifiable key derivation protocol for smart home security: CV-KDP. Inf Technol Manag 21, 115–129 (2020). https://doi.org/10.1007/s10799-019-00307-y
- Smart home
- Key derivation
- Collaborative protocol