Abstract
Currently, special attention is being paid to scenarios where the interconnection of devices with heterogeneous computational and communication capabilities it is required. It is essential to integrate security services during the stages of design and deployment of these networks since many of these scenarios provide critical services such as medical health, payment systems, military affairs, access control, e-banking, etc. This work analyses several cryptographic primitives related to entity authentication providing robust solutions according to device capabilities.
Research supported by MINECO and FEDER under Project TIN2011- 25452.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ivkovic, N., Kresic, D., Hielscher, K.-S., German, R.: Verifying worst case delays in controller area network. In: Schmitt, J.B. (ed.) MMB & DFT 2012. LNCS, vol. 7201, pp. 91–105. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-28540-0_26
Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the internet of things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 420–429. Springer, Heidelberg (2010)
Chatzigiannakis, I., Pyrgelis, A., Spirakis, P., Stamatiou, Y.: Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 715–720 (October 2011)
Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience. In: Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, PST 2004 (2004)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47 (2002)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus (2003)
Hutter, M.: Rfid authentication protocols based on elliptic curves - a top-down evaluation survey. In: Fernández-Medina, E., Malek, M., Hernando, J. (eds.) SECRYPT, pp. 101–110. INSTICC Press (2009)
Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications (2006)
Kavun, E.B., Yalcin, T.: A lightweight implementation of keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258–269. Springer, Heidelberg (2010)
Liu, H., Ning, H.: Zero-knowledge authentication protocol based on alternative mode in rfid systems. IEEE Sensors Journal 11(12), 3235–3245 (December)
Ramzy, I., Arora, A.: Using zero knowledge to share a little knowledge: Bootstrapping trust in device networks. In: Défago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 371–385. Springer, Heidelberg (2011)
Rosati, T., Zaverucha, G.: Elliptic curve certificates and signatures for nfc signature records. Tech. rep., NFC Forum (2011)
Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I., Mazura, M., Harrison, M., Eisenhauer10, M., et al.: Internet of things strategic research roadmap. In: Internet of Things: Global Technological and Societal Trends, p. 9 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hernández-Goya, M.C., Caballero-Gil, P. (2013). Analysis of Lightweight Cryptographic Solutions for Authentication in IoT. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2013. EUROCAST 2013. Lecture Notes in Computer Science, vol 8112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53862-9_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-53862-9_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53861-2
Online ISBN: 978-3-642-53862-9
eBook Packages: Computer ScienceComputer Science (R0)