Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
RISE Research Institutes of Sweden, Digitala system, Datavetenskap.ORCID-id: 0000-0002-0135-683x
Lund University, sweden.ORCID-id: 0000-0001-8003-200X
2022 (Engelska)Ingår i: International Conference on Information Systems Security and PrivacyICISSP 2020: Information Systems Security and Privacy pp 22-47, Springer Science and Business Media Deutschland GmbH , 2022, s. 22-47Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol’s resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. 

Ort, förlag, år, upplaga, sidor
Springer Science and Business Media Deutschland GmbH , 2022. s. 22-47
Nyckelord [en]
Constrained devices, IoT, Ownership transfer, Automation, Cryptography, Domestic appliances, Efficiency, Wireless sensor networks, Appliance sensors, Ownership transfers, Protocol verification, Resource-efficient, Security analysis, Security requirements, Smart homes, Symmetric cryptography, Verification tools, Internet of things
Nationell ämneskategori
Datorteknik
Identifikatorer
URN: urn:nbn:se:ri:diva-58570DOI: 10.1007/978-3-030-94900-6_2Scopus ID: 2-s2.0-85124029226ISBN: 9783030948993 (digital)OAI: oai:DiVA.org:ri-58570DiVA, id: diva2:1638935
Konferens
International Conference on Information Systems Security and Privacy ICISSP 2020: Information Systems Security and Privacy 25 February 2020 through 27 February 2020
Tillgänglig från: 2022-02-18 Skapad: 2022-02-18 Senast uppdaterad: 2025-09-23Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Person

Gunnarsson, MartinGehrmann, Christian

Sök vidare i DiVA

Av författaren/redaktören
Gunnarsson, MartinGehrmann, Christian
Av organisationen
Datavetenskap
Datorteknik

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 266 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf