skip to main content
10.1145/3167132.3167218acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Lightweight secure bootstrap and message attestation in the internet of things

Published: 09 April 2018 Publication History

Abstract

Internet of Things (IoT) offers new opportunities for business, technology and science but it also raises new challenges in terms of security and privacy, mainly because of the inherent characteristics of this environment: IoT devices come from a variety of manufacturers and operators and these devices suffer from constrained resources in terms of computation, communication and storage.
In this paper, we address the problem of trust establishment for IoT and propose a security solution that consists of a secure bootstrap mechanism for device identification as well as a message attestation mechanism for aggregate response validation. To achieve both security requirements, we approach the problem in a confined environment, named SubNets of Things (SNoT), where various devices depend on it. In this context, devices are uniquely and securely identified thanks to their environment and their role within it. Additionally, the underlying message authentication technique features signature aggregation and hence, generates one compact response on behalf of all devices in the subnet.

References

[1]
Mihir Bellare, Chanathip Namprempre, and Gregory Neven. 2004. Security Proofs for Identity-Based Identification and Signature Schemes. In Proceedings of the 23rd International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'04), Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 268--286.
[2]
Mihir Bellare and Gregory Neven. 2006. Identity-Based Multi-signatures from RSA. In Proceedings of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology (CT-RSA'07). Springer-Verlag, Berlin, Heidelberg, 145--162.
[3]
Alexandra Boldyreva. 2003. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography (PKC '03). Springer-Verlag, London, UK, UK, 31--46. http://dl.acm.org/citation.cfm?id=648120.747061
[4]
Dan Boneh and Matt Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In Proceedings of the 21th Annual International Conference on Advances in Cryptology (CRYPTO'01), Joe Kilian (Ed.), Vol. 2139. Springer Berlin Heidelberg, 213--229.
[5]
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). Springer-Verlag, Berlin, Heidelberg, 416--432. http://dl.acm.org/citation.cfm?id=1766171.1766207
[6]
Kevin Butler, Toni R. Farley, Patrick McDaniel, and Jennifer Rexford. 2010. A Survey of BGP Security Issues and Solutions. Proc. IEEE 98, 1 (Jan 2010), 100--122.
[7]
Y. Dodis, J. Katz, S. Xu, and M. Yung. 2003. Strong key-insulated signature schemes. In Proceedings of the International Conference on Public Key Cryptography (PKC'03), Y. Desmedt (Ed.), Vol. 2567. Springer-Verlag, Berlin, Heidelberg, 130--144.
[8]
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, and Victor Shoup. 2004. Anonymous Identification in Ad Hoc Groups. In Proceedings of the 23rd International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'04), Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 609--626.
[9]
David Galindo, Javier Herranz, and Eike Kiltz. 2006. On the Generic Construction of Identity-based Signatures with Additional Properties. In Proceedings of the 12th International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT'06). Springer-Verlag, Berlin, Heidelberg, 178--193.
[10]
Craig Gentry and Zulfikar Ramzan. 2006. Identity-Based Aggregate Signatures. In Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC'06). Springer-Verlag, Berlin, Heidelberg, 257--273.
[11]
Craig Gentry and Alice Silverberg. 2002. Hierarchical ID-Based Cryptography. In Proceedings of the Advances in Crypotology 9th International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT'02), Yuliang Zheng (Ed.), Vol. 2501. Springer Berlin Heidelberg, 548--566.
[12]
K. Itakura and K. Nakamura. 1983. A Public Key Crypto system suitable for Digital Multi-Signatures. NEC Research and Development 71 (1983), 1--8.
[13]
Hoon Wei Lim and Kenneth G. Paterson. 2007. Multi-key Hierarchical Identity-Based Signatures. In Proceedings of the 11th IMA International Conference in Cryptography and Coding, Steven D. Galbraith (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 384--402.
[14]
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, and Brent Waters. 2006. Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'06), Serge Vaudenay (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 465--485.
[15]
Silvio Micali, Kazuo Ohta, and Leonid Reyzin. 2001. Accountable-subgroup Multisignatures: Extended Abstract. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01). ACM, New York, NY, USA, 245--254.
[16]
Lan Nguyen. 2005. Accumulators from Bilinear Pairings and Applications. In Proceedings of the 2005 International Conference on Topics in Cryptology (CTRSA'05). Springer-Verlag, Berlin, Heidelberg, 275--292.
[17]
Karen Seo, Charles Lynn, and Stephen Kent. 2001. Public-key infrastructure for the Secure Border Gateway Protocol (S-BGP). In Proceedings of the DARPA Information Survivability Conference (DISCEX '01), Vol. 1. 239--253 vol.1.
[18]
Adi Shamir. 1985. Identity-based Cryptosystems and Signature Schemes. In Proceedings of the Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'84). Springer-Verlag New York, Inc., New York, NY, USA, 47--53. http://dl.acm.org/citation.cfm?id=19478.19483
[19]
Meiyuan Zhao, Sean W. Smith, and David M. Nicol. 2005. Evaluating the Performance Impact of PKI on BGP Security. In Proceedings of 4th Annual PKI Research Workshop (PKI'05).

Cited By

View all
  • (2024)OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoTProceedings of the 39th ACM/SIGAPP Symposium on Applied Computing10.1145/3605098.3635923(1341-1349)Online publication date: 8-Apr-2024
  • (2023)Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data AdministrationFuture Internet10.3390/fi1502007115:2(71)Online publication date: 12-Feb-2023
  • (2019)A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device CommunicationFuture Internet10.3390/fi1105010811:5(108)Online publication date: 7-May-2019
  • Show More Cited By

Index Terms

  1. Lightweight secure bootstrap and message attestation in the internet of things

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing
      April 2018
      2327 pages
      ISBN:9781450351911
      DOI:10.1145/3167132
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 April 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. identity-based cryptography
      2. internet of things
      3. message attestation
      4. multisignature
      5. secure bootstrap

      Qualifiers

      • Research-article

      Conference

      SAC 2018
      Sponsor:
      SAC 2018: Symposium on Applied Computing
      April 9 - 13, 2018
      Pau, France

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoTProceedings of the 39th ACM/SIGAPP Symposium on Applied Computing10.1145/3605098.3635923(1341-1349)Online publication date: 8-Apr-2024
      • (2023)Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data AdministrationFuture Internet10.3390/fi1502007115:2(71)Online publication date: 12-Feb-2023
      • (2019)A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device CommunicationFuture Internet10.3390/fi1105010811:5(108)Online publication date: 7-May-2019
      • (2019)Security and Privacy in the Internet of Things (IoT): Survey2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE)10.1109/ICECCPCE46549.2019.203774(204-208)Online publication date: Feb-2019

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media