Verification of IoT Devices by Means of a Shared Secret
Autor: | Tomasz Krokosz, Jarogniew Rykowski |
---|---|
Rok vydání: | 2019 |
Předmět: |
Computer science
business.industry SIGNAL (programming language) 020206 networking & telecommunications Cryptography 02 engineering and technology Shared secret Trusted third party Secret sharing Backward compatibility Mode (computer interface) 0202 electrical engineering electronic engineering information engineering Information system 020201 artificial intelligence & image processing business Computer network |
Zdroj: | Advances in Intelligent Systems and Computing ISBN: 9783030304393 ISAT (1) |
DOI: | 10.1007/978-3-030-30440-9_17 |
Popis: | The paper presents a new proposal to solve the problem of confirming the identity of devices in urban Internet of Things environment. The approach is dedicated to Bluetooth Low Energy devices and broadcast transmission. The main goal of the approach is to obtain a suitable level of security and trust with reasonable energy (resources) usage and minimal cost of cryptographic functions. In the case direct interaction with an IoT device is not possible, all the traditional approaches for the verification of trust fail. Moreover, due to the limited resources of a typical IoT device (memory, CPU, battery life), implementation of traditional verification mechanisms is not feasible. In our approach, the IoT devices are detected and inspected by a dedicated application (executed in a smartphone) prepared by a trusted third party (usually city administrator). The system acts as a base for a trusted, generic information system of the city area. The implementation of trust is based on a modified shared-secret algorithm and an exchange of some parameters at the installation phase for each device. Later on, each device is operating autonomously and off-line, transmitting the information only in broadcast mode. The application, while detecting a signal from a device, is able to assess the level of trust towards the device and the information received. The solution assumes backward compatibility with devices and applications which do not require verification of the trust. |
Databáze: | OpenAIRE |
Externí odkaz: |