Projekt per år
Sammanfattning
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol’s resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. The results presented in this paper, an extend version of previously published work on secure ownership transfer protocols for constrained IoT devices by the same authors.
Originalspråk | engelska |
---|---|
Titel på värdpublikation | Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Revised Selected Papers |
Redaktörer | Steven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp |
Förlag | Springer Science and Business Media B.V. |
Sidor | 22-47 |
Antal sidor | 26 |
ISBN (tryckt) | 9783030948993 |
DOI | |
Status | Published - 2022 |
Evenemang | 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 - Valletta, Malta Varaktighet: 2020 feb. 25 → 2020 feb. 27 |
Publikationsserier
Namn | Communications in Computer and Information Science |
---|---|
Volym | 1545 CCIS |
ISSN (tryckt) | 1865-0929 |
ISSN (elektroniskt) | 1865-0937 |
Konferens
Konferens | 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 |
---|---|
Land/Territorium | Malta |
Ort | Valletta |
Period | 2020/02/25 → 2020/02/27 |
Bibliografisk information
Publisher Copyright:© 2022, Springer Nature Switzerland AG.
Ämnesklassifikation (UKÄ)
- Datorteknik
Fingeravtryck
Utforska forskningsämnen för ”Secure Ownership Transfer for Resource Constrained IoT Infrastructures”. Tillsammans bildar de ett unikt fingeravtryck.Projekt
- 1 Aktiva
-
Sec4Factory: Cybersäkerhet för nästa generations fabrik (SEC4FACTORY)
Gehrmann, C. (PI), Kihl, M. (CoPI), Hell, M. (CoI), Fitzgerald, E. (Forskare), Toorani, M. (Forskare), Fitzgerald, E. (Forskare), Tärneberg, W. (Forskare) & Akbarian, F. (Forskare)
Stiftelsen för Strategisk Forskning, SSF
2018/04/01 → 2024/12/31
Projekt: Forskning