Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
Journal of Cryptology
Smart Objects as Building Blocks for the Internet of Things
IEEE Internet Computing
Embedded Interaction: Interacting with the Internet of Things
IEEE Internet Computing
Developing Mobile Workflow Support in the Internet of Things
IEEE Pervasive Computing
Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things
IEEE Pervasive Computing
What Can the Internet of Things Do for the Citizen? Workshop at Pervasive 2010
IEEE Pervasive Computing
IEEE Transactions on Services Computing
Next-Generation Virtual Worlds: Architecture, Status, and Directions
IEEE Internet Computing
SNAIL: an IP-based wireless sensor network approach to the internet of things
IEEE Wireless Communications
IEEE Wireless Communications
IEEE Wireless Communications
Enhanced self-configuration scheme for a robust ZigBee-based home automation
IEEE Transactions on Consumer Electronics
Efficient mobile sensor authentication in smart home and WPAN
IEEE Transactions on Consumer Electronics
Dynamic trust management for internet of things applications
Proceedings of the 2012 international workshop on Self-aware internet of things
Hi-index | 0.00 |
The Internet of Things (IOT) is envisioned as a natural evolution of the Internet, promising to enable ubiquitous connections for pervasive objects. The evolutionary merging of heterogeneous wireless networks is inevitable for smooth migration to IOT; for example, in a typical application of IOT--smart homes--there exist sensor-radio frequency identification (RFID) hybrid networks. The communication security between sensor (or RFID tags) and home control center is critical, whereas an appropriate key management scheme is a prerequisite for communication security. In this paper, we propose a compromise resilient key management scheme including key agreement schemes and key evolution policies to tackle existing remarkable asymmetry with respect to computation resources of hybrid networks. In particular, a forward and backward secure key evolution policy with formal proof is proposed. We also propose a quality of service (QoS)-aware enhancement method by measuring several metrics such as data assurance priority, attacking risk, and remaining power percentage. Security parameter negotiation and a tuning method are proposed, based on reactive measurement in real time. Our proposed scheme is built on abstract cryptographic primitives such as trapdoor permutation, pseudorandom function, pseudorandom number generator, one-way function and hash function so as to retain flexibility for concrete options. Security and performance for proposed key agreement schemes and key evolution policies are compared in detail. Three QoS-aware security strategies are proposed: performance first, security second (PFSS); security first, performance second (SFPS); and performance security made balanced (PSMB). Measurement-based negotiation of security parameters is also proposed in terms of algorithm prototype.