CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things
The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of netwo...
Main Authors: | , , , , |
---|---|
Format: | Journal article |
Published: |
Springer US
2017
|
_version_ | 1797053393666048000 |
---|---|
author | Porambage, P Braeken, A Kumar, P Gurtov, A Ylianttila, M |
author_facet | Porambage, P Braeken, A Kumar, P Gurtov, A Ylianttila, M |
author_sort | Porambage, P |
collection | OXFORD |
description | The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants. |
first_indexed | 2024-03-06T18:43:07Z |
format | Journal article |
id | oxford-uuid:0d927bf1-dfa2-41c7-8d72-f90830c08ac6 |
institution | University of Oxford |
last_indexed | 2024-03-06T18:43:07Z |
publishDate | 2017 |
publisher | Springer US |
record_format | dspace |
spelling | oxford-uuid:0d927bf1-dfa2-41c7-8d72-f90830c08ac62022-03-26T09:41:21ZCHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of ThingsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:0d927bf1-dfa2-41c7-8d72-f90830c08ac6Symplectic Elements at OxfordSpringer US2017Porambage, PBraeken, AKumar, PGurtov, AYlianttila, MThe Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants. |
spellingShingle | Porambage, P Braeken, A Kumar, P Gurtov, A Ylianttila, M CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things |
title | CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things |
title_full | CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things |
title_fullStr | CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things |
title_full_unstemmed | CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things |
title_short | CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things |
title_sort | chip collaborative host identity protocol with efficient key establishment for constrained devices in internet of things |
work_keys_str_mv | AT porambagep chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings AT braekena chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings AT kumarp chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings AT gurtova chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings AT ylianttilam chipcollaborativehostidentityprotocolwithefficientkeyestablishmentforconstraineddevicesininternetofthings |