LAKEE: A Lightweight Authenticated Key Exchange Protocol for Power Constrained Devices

10/28/2022
by   Seyedsina Nabavirazavi, et al.
0

The rapid development of IoT networks has led to a research trend in designing effective security features for them. Due to the power-constrained nature of IoT devices, the security features should remain as lightweight as possible. Currently, most of the IoT network traffic is unencrypted. The leakage of smart devices' unencrypted data can come with the significant cost of a privacy breach. To have a secure channel with encrypted traffic, two endpoints in a network have to authenticate each other and calculate a short-term key. They can then communicate through an authenticated and secure channel. This process is referred to as authenticated key exchange (AKE). Although Datagram Transport Layer Security (DTLS) offers an AKE protocol for IoT networks, research has proposed more efficient and case-specific alternatives. This paper presents LAKEE, a straightforward, lightweight AKE protocol for IoT networks. Our protocol employs elliptic curve cryptography for generating a short-term session key. It reduces the communication and computational overhead of its alternatives while maintaining or improving their security strength. The simplicity and low overhead of our protocol make it a fit for a network of constrained devices.

READ FULL TEXT
research
10/30/2019

Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks

With the advancement of technology, devices, which are considered non-tr...
research
07/21/2022

Secure Lightweight Authentication for Multi User IoT Environment

The Internet of Things (IoT) is giving a boost to a plethora of new oppo...
research
07/27/2022

EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

Industrial IoT (IIoT) aims to enhance services provided by various indus...
research
07/23/2019

Towards Secure IoT: Securing Messages Dissemination in Intelligent Traffic Systems

A few years ago, Automotive area in the IoT was seen as theoretical conc...
research
07/21/2021

A low-overhead approach for self-sovereign identity in IoT

We present a low-overhead mechanism for self-sovereign identification an...
research
10/17/2018

Implementation and Analysis of QUIC for MQTT

Transport and secure layer protocols are essential to ensure reliable an...
research
11/22/2021

Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

Several efforts have been seen claiming the lightweight block ciphers as...

Please sign up or login with your details

Forgot password? Click here to reset