Skip to main content

Analysis of Lightweight Cryptographic Solutions for Authentication in IoT

  • Conference paper
Computer Aided Systems Theory - EUROCAST 2013 (EUROCAST 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8112))

Included in the following conference series:

Abstract

Currently, special attention is being paid to scenarios where the interconnection of devices with heterogeneous computational and communication capabilities it is required. It is essential to integrate security services during the stages of design and deployment of these networks since many of these scenarios provide critical services such as medical health, payment systems, military affairs, access control, e-banking, etc. This work analyses several cryptographic primitives related to entity authentication providing robust solutions according to device capabilities.

Research supported by MINECO and FEDER under Project TIN2011- 25452.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ivkovic, N., Kresic, D., Hielscher, K.-S., German, R.: Verifying worst case delays in controller area network. In: Schmitt, J.B. (ed.) MMB & DFT 2012. LNCS, vol. 7201, pp. 91–105. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-28540-0_26

    Chapter  Google Scholar 

  2. Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the internet of things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 420–429. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  3. Chatzigiannakis, I., Pyrgelis, A., Spirakis, P., Stamatiou, Y.: Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 715–720 (October 2011)

    Google Scholar 

  4. Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience. In: Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, PST 2004 (2004)

    Google Scholar 

  5. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47 (2002)

    Google Scholar 

  6. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus (2003)

    Google Scholar 

  7. Hutter, M.: Rfid authentication protocols based on elliptic curves - a top-down evaluation survey. In: Fernández-Medina, E., Malek, M., Hernando, J. (eds.) SECRYPT, pp. 101–110. INSTICC Press (2009)

    Google Scholar 

  8. Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications (2006)

    Google Scholar 

  9. Kavun, E.B., Yalcin, T.: A lightweight implementation of keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258–269. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Liu, H., Ning, H.: Zero-knowledge authentication protocol based on alternative mode in rfid systems. IEEE Sensors Journal 11(12), 3235–3245 (December)

    Google Scholar 

  11. Ramzy, I., Arora, A.: Using zero knowledge to share a little knowledge: Bootstrapping trust in device networks. In: Défago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 371–385. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Rosati, T., Zaverucha, G.: Elliptic curve certificates and signatures for nfc signature records. Tech. rep., NFC Forum (2011)

    Google Scholar 

  13. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I., Mazura, M., Harrison, M., Eisenhauer10, M., et al.: Internet of things strategic research roadmap. In: Internet of Things: Global Technological and Societal Trends, p. 9 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hernández-Goya, M.C., Caballero-Gil, P. (2013). Analysis of Lightweight Cryptographic Solutions for Authentication in IoT. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2013. EUROCAST 2013. Lecture Notes in Computer Science, vol 8112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53862-9_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53862-9_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53861-2

  • Online ISBN: 978-3-642-53862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics