ABSTRACT
There is no doubt that the Internet of Things (IoT) has the power to change our world and drive us to a complete social evolution. In business and industry, there are thousands of IoT use cases and real-life IoT deployments across a variety of sectors (e.g. industry 4.0 and smart factories, smart cities, etc.). However, due to the vastly resource constrained nature of the devices used in IoT, implementing secure and privacy-preserving services, using for example standard asymmetric cryptographic algorithms, has been a real challenge. The majority of IoT devices on the market currently employ the use of various forms of symmetric cryptography such as key pre-distribution. The overall efficiency of such implementations correlate directly to the size of the IoT environment and the deployment method. In this paper, we implement a lightweight cryptographic library that can be used to secure communication protocols between multiple communicating nodes without the need for external trusted entities or a server. Our implementation is based on modifying the Elliptic-Curve Diffie-Hillman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA) components of the Tinycrypt cryptographic library. This work focuses on extending the functionalities of the User Datagram Protocol (UDP) broadcast application on the Contiki-NG Operating System (OS) platform.
- Tinyos project.Google Scholar
- Contiki-Ng. Contiki-ng: Documentation.Google Scholar
- T. Dimitriou and A. Michalas. Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks, 15:53--66, Apr. 2014.Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security, (3), 2002.Google ScholarDigital Library
- D.Feng. Trusted computing: Principles and Applications. De Gruyter, 2017.Google Scholar
- M. Hutter and E. Wenger. Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. Cryptographic Hardware and Embedded Systems - CHES 2011 Lecture Notes in Computer Science, page 459--474, 2011.Google Scholar
- A. Kurniawan. Practical Contiki-NG: Programming for Wireless Sensor Networks. Apress, 2018.Google ScholarCross Ref
- Z. Liang, J. P. Walters, V. Chaudhary, and W. Shi. Wireless sensor network security. Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007.Google Scholar
- A. Michalas and R. Murray. Keep pies away from kids: A raspberry pi attacking tool. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, IoTS&P '17, pages 61--62, New York, NY, USA, 2017. ACM.Google ScholarDigital Library
- N. Paladi, C. Gehrmann, and A. Michalas. Providing user security guarantees in public infrastructure clouds. IEEE Transactions on Cloud Computing, 5(3):405--419, July 2017.Google ScholarCross Ref
- S. Raza, T. Helgason, P. Papadimitratos, and T. Voigt. Securesense: End-to-end secure communication architecture for the cloud-connected internet of things. Future Generation Computer Systems, 77:40--51, 2017.Google ScholarDigital Library
- M. A. Strangio. Efficient diffie-hellmann two-party key agreement protocols based on elliptic curves. Proceedings of the 2005 ACM symposium on Applied computing - SAC 05, 2005.Google ScholarDigital Library
- K. Sun, A. Liu, R. Xu, P. Ning, and D. Maughan. Securing network access in wireless sensor networks. Proceedings of the second ACM conference on Wireless network security - WiSec 09, 2009.Google ScholarDigital Library
- C. M. Technology. Wireless sensor networks: Imote2.Google Scholar
- M. Wood. Tinycrypt, Apr 2019.Google Scholar
- L. Zhou, C. Su, Z. Hu, S. Lee, and H. Seo. Lightweight implementations of nist p-256 and sm2 ecc on 8-bit resource-constraint embedded device. ACM Transactions on Embedded Computing Systems, 18(3):1--13, 2019.Google ScholarDigital Library
- Zolertia. Zolertia/orion ethernet ip64 router.Google Scholar
- Zolertia. Zolertia/re-mote platform.Google Scholar
Index Terms
- SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG
Recommendations
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of electricity generation by providing the capability to monitor the consumption behavior of customers. This advance grid system can help to promote cultural heritage ...
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing
Recently, numerous multireceiver identity-based encryption or identity-based broadcast encryption schemes have been introduced with bilinear pairing and probabilistic map-to-point MTP function. As the bilinear pairing and MTP functions are expensive ...
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
A provably secure certificateless digital signature scheme using elliptic curve cryptography is presented in this paper. Since the certificateless public key cryptosystem removes the complex certificate management procedure and the private key escrow ...
Comments