Secure Multicast with Source Authentication for the Internet of Things
نویسندگان
چکیده
English) The Internet of Things is a rapidly evolving eld of high-end technology and research. Its security is vital to the reliability and safety of the future everyday communications. The DTLS protocol is a default protocol to assure security for unicast communication. A DTLS record layer extension for multicast in constrained environments is being designed to assure security for multicast. However, currently proposed DTLS-based multicast does not provide such an essential property as source authenticity for the transmitted data. Moreover, handshake layer is designed to establish pairwise keys only, and hence, there is no way to distribute and manage group keys either. The two aforementioned downsides become the primary objectives of the design for the thesis. This thesis is conducted in collaboration with Philips. In the thesis, we formulate requirements to secure multicast in constrained environment based on the company's outdoor lighting scenario with centralized trust model. We evaluate various source authentication schemes and 4 key management protocols with regards to the formulated requirements. We select two authentication schemes and apply them to our scenario. As a result we design an extension of DTLS based multicast with support of ECDSA signature for source authentication and we develop a prototype implementation. Besides that, we determine cryptographic primitives for the TESLA scheme and adapt the scheme to be used for periodic communication pattern. Further, we design a lightweight and exible group key management solution to distribute group keys and public keys by the trusted authority.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کامل