Authenticated key establishment for low-resource devices exploiting correlated random channels

@article{Zenger2016AuthenticatedKE,
  title={Authenticated key establishment for low-resource devices exploiting correlated random channels},
  author={Christian T. Zenger and Mario Pietersz and Jan Zimmer and Jan-Felix Posielek and Thorben Lenze and Christof Paar},
  journal={Computer Networks},
  year={2016},
  volume={109},
  pages={105-123}
}
Abstract Authenticated key establishment is a central requirement for securing IoT devices. For efficiency and management reasons, it might be desirable to avoid public-key-based solutions that are ubiquitous in traditional Internet settings but have many drawbacks for resource-constrained (RC) nodes. We introduce a novel Vicinity-based Pairing (VP) mechanism that allows authenticating arbitrary ‘unloaded’ RC-nodes by delegating trust from already authenticated and secured, we call it ‘loaded… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-9 OF 9 CITATIONS

IoT Devices Security Using RF Fingerprinting

  • 2019 Advances in Science and Engineering Technology International Conferences (ASET)
  • 2019

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

  • 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Formalizing the resurrecting duckling into hierarchical coloured Petri nets

  • 2016 International Conference on Emerging Technologies (ICET)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 55 REFERENCES

Secret Key Extraction from Wireless Signal Strength in Real Environments

  • IEEE Transactions on Mobile Computing
  • 2009
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

C

C. T. Zenger, M. Pietersz
  • Paar, Preventing relay attacks and providing perfect forward secrecy using physec on 8-bit uc
  • 2016

C

C. T. Zenger, J. Zimmer, M. Pietersz, B. Driessen
  • Paar, Constructive and destructive aspects of adaptive wormholes for the 5g tactile internet
  • 2016
VIEW 2 EXCERPTS