CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things

The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of netwo...

Full description

Bibliographic Details
Main Authors: Porambage, P, Braeken, A, Kumar, P, Gurtov, A, Ylianttila, M
Format: Journal article
Published: Springer US 2017
_version_ 1797053393666048000
author Porambage, P
Braeken, A
Kumar, P
Gurtov, A
Ylianttila, M
author_facet Porambage, P
Braeken, A
Kumar, P
Gurtov, A
Ylianttila, M
author_sort Porambage, P
collection OXFORD
description The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.
first_indexed 2024-03-06T18:43:07Z
format Journal article
id oxford-uuid:0d927bf1-dfa2-41c7-8d72-f90830c08ac6
institution University of Oxford
last_indexed 2024-03-06T18:43:07Z
publishDate 2017
publisher Springer US
record_format dspace
spelling oxford-uuid:0d927bf1-dfa2-41c7-8d72-f90830c08ac62022-03-26T09:41:21ZCHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of ThingsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:0d927bf1-dfa2-41c7-8d72-f90830c08ac6Symplectic Elements at OxfordSpringer US2017Porambage, PBraeken, AKumar, PGurtov, AYlianttila, MThe Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.
spellingShingle Porambage, P
Braeken, A
Kumar, P
Gurtov, A
Ylianttila, M
CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
title CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
title_full CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
title_fullStr CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
title_full_unstemmed CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
title_short CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
title_sort chip collaborative host identity protocol with efficient key establishment for constrained devices in internet of things
work_keys_str_mv AT porambagep chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings
AT braekena chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings
AT kumarp chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings
AT gurtova chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings
AT ylianttilam chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings