liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things
University of Oulu, Finland.
Vrije University of Brussel, Belgium.
University of Oxford, England.
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0002-9829-9287
Show others and affiliations
2017 (English)In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 96, no 1, p. 421-440Article in journal (Refereed) Published
Abstract [en]

The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.

Place, publisher, year, edition, pages
SPRINGER , 2017. Vol. 96, no 1, p. 421-440
Keywords [en]
Internet of Things; Key establishment; Proxy; Host identity protocol; Resource-constrained devices
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:liu:diva-140795DOI: 10.1007/s11277-017-4176-5ISI: 000408123600025OAI: oai:DiVA.org:liu-140795DiVA, id: diva2:1140968
Note

Funding Agencies|TEKES; European Celtic-Plus project CONVINcE; EU COST Action [1303]; Naked Approach project - TEKES; Center for Industrial Information Technology (CENIIT)

Available from: 2017-09-13 Created: 2017-09-13 Last updated: 2017-09-13

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Search in DiVA

By author/editor
Gurtov, Andrei
By organisation
Database and information techniquesFaculty of Science & Engineering
In the same journal
Wireless personal communications
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 75 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf