University of Oulu

Porambage, P., Braeken, A., Kumar, P. et al. Wireless Pers Commun (2017) 96: 421. https://doi.org/10.1007/s11277-017-4176-5

CHIP : collaborative host identity protocol with efficient key establishment for constrained devices in internet of things

Saved in:
Author: Porambage, Pawani1; Braeken, An2; Kumar, Pardeep3;
Organizations: 1Centre for Wireless Communications, Department of Communication Engineering, University of Oulu, P.o. Box 4500, 90014 Oulu, Finland
2INDI, Vrije Universiteit Brussel, 1000 Brussels, Belgium
3Department of Computer Science, University of Oxford, Oxford, UK
4Department of Computer and Information Science (IDA), Linköping University, Linköping, Sweden
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.9 MB)
Persistent link: http://urn.fi/urn:nbn:fi-fe2018062726519
Language: English
Published: Springer Nature, 2017
Publish Date: 2018-04-29
Description:

Abstract

The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.

see all

Series: Wireless personal communications
ISSN: 0929-6212
ISSN-E: 1572-834X
ISSN-L: 0929-6212
Volume: 96
Issue: 1
Pages: 421 - 440
DOI: 10.1007/s11277-017-4176-5
OADOI: https://oadoi.org/10.1007/s11277-017-4176-5
Type of Publication: A1 Journal article – refereed
Field of Science: 113 Computer and information sciences
Subjects:
Funding: This works is supported by TEKES and the European Celtic-Plus project CONVINcE and was partially funded by Finland, France, Romania, Sweden and Turkey. A part of this research has been also supported by EU COST Action 1303 and the Naked Approach project funded by TEKES. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
Copyright information: © Springer Science+Business Media New York 2017. This is a post-peer-review, pre-copyedit version of an article published in Wireless Personal Communications.The final authenticated version is available online at: http://dx.doi.org/10.1007/s11277-017-4176-5