Authenticated key establishment for low-resource devices exploiting correlated random channels
Autor: | Thorben Lenze, Jan Zimmer, Christof Paar, Christian T. Zenger, Jan-Felix Posielek, Mario Pietersz |
---|---|
Rok vydání: | 2016 |
Předmět: |
021110 strategic
defence & security studies Key establishment Authentication Delegation Computer Networks and Communications Computer science business.industry media_common.quotation_subject 0211 other engineering and technologies Process (computing) 020206 networking & telecommunications 02 engineering and technology Symmetric-key algorithm Default gateway Pairing Wireless network interface controller 0202 electrical engineering electronic engineering information engineering Wireless The Internet business Protocol (object-oriented programming) Communication channel Computer network media_common |
Zdroj: | Computer Networks. 109:105-123 |
ISSN: | 1389-1286 |
DOI: | 10.1016/j.comnet.2016.06.013 |
Popis: | Authenticated key establishment is a central requirement for securing IoT devices. For efficiency and management reasons, it might be desirable to avoid public-key-based solutions that are ubiquitous in traditional Internet settings but have many drawbacks for resource-constrained (RC) nodes. We introduce a novel Vicinity-based Pairing (VP) mechanism that allows authenticating arbitrary ‘unloaded’ RC-nodes by delegating trust from already authenticated and secured, we call it ‘loaded’, RC-nodes. For authenticating RC-nodes, VP exploits the correlation between channel profiles from devices that are in close physical proximity. In our setting, only devices that are within a few centimetres from the ‘loaded’ RC-nodes are authenticated after a user initiates such a process. Subsequently, the embedded end device can extract an unique shared symmetric key with another device such as a SCADA gateway, again by exploiting channel parameters. Based on extensive experiments, we propose new techniques for extracting time-varying randomness from channel parameters for use in VP. We describe the first MITM-resistant device pairing protocol purely based on a single wireless interface with an extensive adversarial model and protocol analysis. We show that existing wireless devices can be retro-fitted with the VP protocol via software updates, i.e. without changes to the hardware. Implementation results of our embedded prototype demonstrates that the approach has the potential to dramatically reduce the cost and efforts of securing low-resource devices that are common in the IoT. |
Databáze: | OpenAIRE |
Externí odkaz: |