Mid Sweden University

miun.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Proof-of-Concept of Network Key Management Using Lattice-Based Cryptography
University of Mons, Belgium.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. (Communication Systems and Networks (CSN))ORCID iD: 0000-0001-7873-3499
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. (Communication Systems and Networks (CSN))ORCID iD: 0000-0003-0873-7827
2022 (English)In: 18th IEEE International Wireless Communications & Mobile Computing Conference (IWCMC'22)., IEEE, 2022, p. 979-984Conference paper, Published paper (Refereed)
Abstract [en]

With the ever-increasing use of large-scale IoT networks in different sectors of the industry, it has become critical to realise seamless and secure communication between devicesi n the network. Realising secure group-communication in the IoT requires solving the problem of group-key establishment. Int his work, we solve the problem designing a new lattice-based Key Encapsulation Mechanism (KEM) for resource-constrained devices that enables the distribution of a symmetric key or any other data between all the devices in a given network. This is achieved by coupling multiple private keys to a unique public key. Moreover, we present a proof-of-concept implementation based on the GGH algorithm. The results show it is feasible to use lattice-based cryptography to allow for a seamless and secure group communications within a decentralised IoT network. It has been bench-marked against other common post-quantum constructs and proven to be more practical with respect to memory consumption and security, although considerably slower due to lack of optimisation in the implementation

Place, publisher, year, edition, pages
IEEE, 2022. p. 979-984
Keywords [en]
Lattice-based cryptography, GGH, IoT, IIoT, Key encapsulation mechanism
National Category
Computer Engineering Communication Systems
Identifiers
URN: urn:nbn:se:miun:diva-44900DOI: 10.1109/IWCMC55113.2022.9824629ISI: 001058917600164Scopus ID: 2-s2.0-85135301910OAI: oai:DiVA.org:miun-44900DiVA, id: diva2:1654492
Conference
18th IEEE International Wireless Communications & Mobile Computing Conference (IWCMC 2022), Dubrovnik, Croatia, May 30-June 3, 2022.
Funder
Knowledge Foundation, KK Profilen NIITAvailable from: 2022-04-27 Created: 2022-04-27 Last updated: 2023-10-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Gebremichael, TeklayGidlund, Mikael

Search in DiVA

By author/editor
Gebremichael, TeklayGidlund, Mikael
By organisation
Department of Information Systems and Technology
Computer EngineeringCommunication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 401 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf