Mid Sweden University

miun.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Survey of Proximity Based Authentication Mechanisms for the Industrial Internet of Things
City University of Hong Kong.
City University of Hong Kong.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.ORCID iD: 0000-0001-7873-3499
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
Show others and affiliations
2018 (English)In: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2018, p. 5246-5251Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we present an overview of the variousproximity based authentication mechanisms that can be usedin the Industrial Internet of Things (IIoT). We seek to identifyand highlight from a holistic point of view which mechanismscan enable proximity based authentication for the IndustrialInternet of Things. In addition, we identify which upcomingproximity authentication mechanisms are most important for theproliferation of the Industrial Internet of Things, and highlightmajor obstacles that remain unsolved with regard to authen-tication. In answering this, we present seven mechanisms forproximity based authentication (i.e. wire, radio, acoustics, light,image, gesture and biometrics) and discuss each mechanism inperspective of their vulnerability to different kind of attacks (suchas eavesdropping, impersonation and denial of service attacksetc.) and their usability (such as proximity range, hardwarerequirement and ease of use) in terms of the practicality in IIoTenvironment in the light of which we present two typical IIoTuse cases that require proximity based authentication.

Place, publisher, year, edition, pages
IEEE, 2018. p. 5246-5251
Keywords [en]
Authentication, Industrial Internet of Things, Proximity, Survey
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:miun:diva-34718DOI: 10.1109/IECON.2018.8591118ISI: 000505811105029Scopus ID: 2-s2.0-85061559199ISBN: 978-1-5090-6684-1 (electronic)OAI: oai:DiVA.org:miun-34718DiVA, id: diva2:1255605
Conference
The 44th Annual Conference of the IEEE Industrial Electronics Society (IECON2018), Washington DC,October 21-23, 2018.
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)Available from: 2018-10-12 Created: 2018-10-12 Last updated: 2020-02-19Bibliographically approved
In thesis
1. Lightweight Cryptographic Group Key Management Protocols for the Internet of Things
Open this publication in new window or tab >>Lightweight Cryptographic Group Key Management Protocols for the Internet of Things
2019 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The Internet of Things (IoT) is increasingly becoming an integral component of many applications in consumer, industrial and other areas. Notions such as smart industry, smart transport, and smart world are, in large part, enabled by IoT. At its core, the IoT is underpinned by a group of devices, such as sensors and actuators, working collaboratively to provide a required service. One of the important requirements most IoT applications are expected to satisfy is ensuring the security and privacy of users. Security is an umbrella term that encompasses notions such as confidentiality, integrity and privacy, that are typically achieved using cryptographic encryption techniques.

A special form of communication common in many IoT applications is group communication, where there are two or more recipients of a given message. In or-der to encrypt a message broadcast to a group, it is required that the participating parties agree on a group key a priori. Establishing and managing a group key in IoT environments, where devices are resources-constrained and groups are dynamic, is a non-trivial problem. The problem presents unique challenges with regard to con-structing protocols from lightweight and secure primitives commensurate with the resource-constrained nature of devices and maintaining security as devices dynamically leave or join a group.

This thesis presents lightweight group key management protocols proposed to address the aforementioned problem, in a widely adopted model of a generic IoT network consisting of a gateway with reasonable computational power and a set of resource-constrained nodes. The aim of the group key management protocols is to enable the gateway and the set of resource-constrained devices to establish and manage a group key, which is then used to encrypt group messages. The main problems the protocols attempt to solve are establishing a group key among participating IoT devices in a secure and computationally feasible manner; enabling additionor removal of a device to the group in a security preserving manner; and enabling generation of a group session key in an efficient manner without re-running the protocol from scratch. The main challenge in designing such protocols is ensuring that the computations that a given IoT device performs as part of participating in the protocol are computationally feasible during initial group establishment, group keyupdate, and adding or removing a node from the group.

The work presented in this thesis shows that the challenge can be overcome by designing protocols from lightweight cryptographic primitives. Specifically, protocols that exploit the lightweight nature of crypto-systems based on elliptic curves and the perfect secrecy of the One Time Pad (OTP) are presented. The protocols are designed in such a way that a resource-constrained member node performs a constant number of computationally easy computations during all stages of the group key management process.

To demonstrate that the protocols are practically feasible, implementation resultof one of the protocols is also presented, showing that the protocol outperforms similar state-of-the-art protocols with regard to energy consumption, execution time, memory usage and number of messages generated.

Place, publisher, year, edition, pages
Sundsvall: Mid Sweden University, 2019. p. 54
Series
Mid Sweden University licentiate thesis, ISSN 1652-8948 ; 154
Keywords
Privacy and security of the IoT, IoT group key management, lightweight key management protocols, elliptic curve cryptography, proximity-based authentication
National Category
Computer Sciences
Identifiers
urn:nbn:se:miun:diva-35607 (URN)978-91-88527-91-2 (ISBN)
Presentation
2019-03-07, C326, Holmgatan 10, Sundsvall, 11:00 (English)
Opponent
Supervisors
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Note

Vid tidpunkten för framläggningen av avhandlingen var följande delarbete opublicerat: delarbete 3 (manuskript).

At the time of the defence the following paper was unpublished: paper 3 (manuscript).

Available from: 2019-02-08 Created: 2019-02-07 Last updated: 2019-06-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Gebremichael, TeklayJennehag, UlfForsström, StefanGidlund, Mikael

Search in DiVA

By author/editor
Gebremichael, TeklayJennehag, UlfForsström, StefanGidlund, Mikael
By organisation
Department of Information Systems and Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 652 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf