Access the full text.
Sign up today, get DeepDyve free for 14 days.
C. Kaufman (2005)
Internet Key Exchange (IKEv2) ProtocolRFC, 4306
R. Hummen, Hanno Wirtz, J. Ziegeldorf, Jens Hiller, Klaus Wehrle (2013)
Tailoring end-to-end IP security protocols to the Internet of Things2013 21st IEEE International Conference on Network Protocols (ICNP)
R. Román, Jianying Zhou, Javier López (2013)
On the features and challenges of security and privacy in distributed internet of thingsComput. Networks, 57
(2007)
LHIP lightweight authentication extension for HIP. IETF draft
(2014)
HIP Diet EXchange (DEX). IETF draft
Shancang Li, Lida Xu, Shanshan Zhao (2014)
The internet of things: a surveyInformation Systems Frontiers, 17
P. Jokela, R. Moskowitz, P. Nikander (2008)
Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)RFC, 5202
C. Pham (2014)
Communication performances of IEEE 802.15.4 wireless sensor motes for data-intensive applications: A comparison of WaspMote, Arduino MEGA, TelosB, MicaZ and iMote2 for image surveillanceJ. Netw. Comput. Appl., 46
Óscar García-Morchón, S. Keoh, Sandeep Kumar, Pedro Moreno-Sánchez, Francisco Vidal-Meca, J. Ziegeldorf (2013)
Securing the IP-based internet of things with HIP and DTLS
P. Nikander, A. Gurtov, T. Henderson (2010)
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 NetworksIEEE Communications Surveys & Tutorials, 12
P. Porambage, An Braeken, Pardeep Kumar, A. Gurtov, M. Ylianttila (2015)
Proxy-based end-to-end key establishment protocol for the Internet of Things2015 IEEE International Conference on Communication Workshop (ICCW)
A. Gurtov, D. Korzun, Andrey Lukyanenko, P. Nikander (2008)
Hi3: An efficient and secure networking architecture for mobile hostsComput. Commun., 31
A. Shamir (1979)
How to share a secretCommun. ACM, 22
S. Keoh, Sandeep Kumar, H. Tschofenig (2014)
Securing the Internet of Things: A Standardization PerspectiveIEEE Internet of Things Journal, 1
W Diffie, M Hellman (1976)
New directions in cryptographyIEEE Transaction on Information Theory, 22
L Atzori, A Iera, G Morabito (2010)
The Internet of Things: A surveyComputer Networks, 54
(2012)
His current research interests include security in sensor networks, smart environments, cyber physical systems, body area networks
(2014)
Waspmote sensor boards . Libelium
Thomas Kothmayr, C. Schmitt, W. Hu, M. Brünig, G. Carle (2013)
DTLS based security and two-way authentication for the Internet of ThingsAd Hoc Networks, 11
Priyanka Rawat, K. Singh, H. Chaouchi, J. Bonnin (2014)
Wireless sensor networks: a survey on recent developments and potential synergiesThe Journal of Supercomputing, 68
W. Diffie, M. Hellman (1976)
New Directions in CryptographyDemocratizing Cryptography
P. Levis, D. Engler, Mark Horowitz, Christos Kozyrakis, Steve Eglash (2020)
Securing the Internet of Things
P. Porambage, An Braeken, Pardeep Kumar, A. Gurtov, M. Ylianttila (2017)
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of ThingsWireless Personal Communications, 96
Yosra Saied, Alexis Olivereau (2012)
D-HIP: A distributed key exchange scheme for HIP-based Internet of Things2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
D. Miorandi, S. Sicari, F. Pellegrini, I. Chlamtac (2012)
Internet of things: Vision, applications and research challengesAd Hoc Networks, 10
Yosra Saied, Alexis Olivereau (2012)
HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of ThingsThird International Conference on Communications and Networking
P. Porambage, C. Schmitt, Pardeep Kumar, A. Gurtov, M. Ylianttila (2014)
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT ApplicationsInternational Journal of Distributed Sensor Networks, 10
Martina Brachmann, S. Keoh, Óscar García-Morchón, Sandeep Kumar (2012)
End-to-End Transport Security in the IP-Based Internet of Things2012 21st International Conference on Computer Communications and Networks (ICCCN)
Liang Zhou, H. Chao (2011)
Multimedia traffic security architecture for the internet of thingsIEEE Network, 25
R. Román, Cristina Alcaraz, Javier López, N. Sklavos (2011)
Key management systems for sensor networks in the context of the Internet of ThingsComput. Electr. Eng., 37
Pin Nie, Juho Vähä-Herttua, T. Aura, A. Gurtov (2011)
Performance analysis of HIP diet exchange for WSN security establishment
P. Porambage, C. Schmitt, Pardeep Kumar, A. Gurtov, M. Ylianttila (2014)
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications2014 IEEE Wireless Communications and Networking Conference (WCNC)
P. Porambage, An Braeken, Pardeep Kumar, A. Gurtov, M. Ylianttila (2014)
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach2015 IEEE Global Communications Conference (GLOBECOM)
Yosra Saied, Alexis Olivereau, D. Zeghlache, M. Laurent-Maknavicius (2014)
Lightweight collaborative key establishment scheme for the Internet of ThingsComput. Networks, 64
The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.
Wireless Personal Communications – Springer Journals
Published: Apr 29, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.