liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
IoT and HIPs Opportunistic Mode
Bar Ilan Univ, Israel.
Jerusalem Coll Technol, Israel.
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0002-9829-9287
2021 (English)In: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 20, no 4, p. 1434-1448Article in journal (Refereed) Published
Abstract [en]

Key sharing has always been a complex issue. It became even more challenging for the Internet of Things (IoT), where a trusted third party for global management rarely exists. With authentication and confidentiality lacking, things resort to a leap of faith (LoF) paradigm where it is assumed that no attacker is present during the initial configuration. In this paper we focus on the Host Identity Protocol (HIP), specifically designed to provide mobility and multihoming capabilities. Although HIP is normally based on many strict security mechanisms (e.g., DNSSEC), it also provides a better than nothing opportunistic mode, based on the LoF paradigm, which is to be used when other more trusted mechanisms are not available. In this paper, we analyze different MiTM attacks which might occur under this opportunistic mode. Taking advantage of HIPs multihoming capabilities, we propose two key spraying techniques which strengthen the opportunistic modes security. The first technique spreads the four key-exchange messages among different networks, while the second spreads fractions of one of those messages. Evaluation of these techniques is provided, demonstrating the major benefit of our proposal.

Place, publisher, year, edition, pages
IEEE COMPUTER SOC , 2021. Vol. 20, no 4, p. 1434-1448
Keywords [en]
Hip; IP networks; Internet of Things; Spraying; Sensors; Authentication; HIP; IoT; security; leap-of-faith; mobility; multihoming; MiTM
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:liu:diva-174950DOI: 10.1109/TMC.2020.2967044ISI: 000626524300014OAI: oai:DiVA.org:liu-174950DiVA, id: diva2:1543733
Note

Funding Agencies|CENIIT project [17.01]; Ariel Cyber Innovation Center; Israel National Cyber directorate in the Prime Ministers Office

Available from: 2021-04-13 Created: 2021-04-13 Last updated: 2021-04-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Search in DiVA

By author/editor
Gurtov, Andrei
By organisation
Database and information techniquesFaculty of Science & Engineering
In the same journal
IEEE Transactions on Mobile Computing
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 37 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf