Abstract
The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agren, M.: On some symmetric lightweight cryptographic designs. Diss. Lund University (2012)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Bansod, G., Raval, N., Pisharoty, N.: Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inf. Forensics Secur. 10(1) (2015)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Keccak sponge function family main document. Updated submission to NIST, Round 2, version 2.1 (2010)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission. http://keccak.noekeon.org/Keccak-submission-3.pdf
Brusilovsky, A., Faynberg, I., Zeltsan, Z., Patel, S.: Password-Authenticated Key (PAK) Diffie-Hellman Exchange. RFC 5683 (2010)
Caballero-Gil, P., Caballero-Gil, C., Molina-Gil, J., Hernández-Goya, C.: Self-organized authentication architecture for mobile Ad-hoc networks. In: IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops WiOPT, pp. 217–224 (2008)
Caballero-Gil, C., Caballero-Gil, P., Molina-Gil, J.: Knowledge management using clusters in VANETs-description, simulation and analysis. In: International Conference on Knowledge Management and Information Sharing, pp. 170–175 (2010)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 4(6), 522–533 (2007)
Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 37–46 (2003)
ETSI/SAGE: Specification of the 3GPP confidentiality and integrity algorithms UEA2 and UIA2. Document 2, SNOW 3G Specification, version 1.1 (2005)
Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptol. 1(2), 77–94 (1988)
Garey, M.R., Johnson, D.S.: Computers and intractability: a guide the theory of NP-completeness. Freeman and Co., (1979)
Gartner, Analysts to explore the disruptive impact of IoT on business. In: Gartner Symposium/ITxpo, Spain (2014)
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 690–728 (1991)
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)
Groth, J.: Short non-interactive zero-knowledge proofs. In: Advances in Cryptology—ASIACRYPT, pp. 341–358 (2010)
Grzonkowski, S., Zaremba, W., Zaremba, M., McDaniel, B.: Extending web applications with a lightweight zero knowledge proof authentication. In: ACM International Conference on Soft Computing as Transdisciplinary Science and Technology, pp. 65–70 (2008)
Kantar, Kantar Worldpanel ComTech. http://www.kantarworldpanel.com/global/smartphone-os-market-share/ (2015)
Martin-Fernandez, F.: Source code of the proposed authenticated scheme. https://github.com/pacomf/ASD (2014)
Schweitzer, P.: Problems of unknown complexity. Graph isomorphism and Ramsey theoretic numbers. Diss. University of Saarlandes (2009)
Toorani, M., Beheshti, A.: LPKI—a lightweight public key infrastructure for the mobile environments. In: IEEE Singapore International Conference on Communication Systems, pp. 162–165 (2008)
Acknowledgments
Research supported under TIN2011-25452, IPT-2012-0585-370000, BES-2012-051817, and RTC-2014-1648-8.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Martín-Fernández, F., Caballero-Gil, P., Caballero-Gil, C. (2015). Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)