当前位置: X-MOL 学术Int. J. Inf. Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
International Journal of Information Security ( IF 2.4 ) Pub Date : 2021-08-28 , DOI: 10.1007/s10207-021-00562-7
Sairath Bhattacharjya 1 , Hossein Saiedian 1, 2
Affiliation  

IoT devices are slowly turning out to be an essential part of our everyday lives. These devices perform one operation, and they specialize in doing so. When communicating with these devices, we need to set up a secured key preventing unauthorized communications. We have been using the plug-and-play model for electronic devices for decades. These IoT devices fall into the same realm. The plug–pair–play connection model follows the same principle so that the user does not feel the added pressure of remembering a complex password or rely on a default credential. It helps to generate a secret that is only known to the device and its user. We used elliptic curve cryptography to circumvent the resource limitations on the device. The model establishes a zero-trust pattern where all requests and responses are validated and verified before being processed. This paper provides a unique way to set up a secret key for each user and device pair without much user interaction. The model sets the path to end-to-end secured communication.



中文翻译:

为物联网设备建立和验证安全密钥:在基于云的架构上使用 P3 连接模型

物联网设备正逐渐成为我们日常生活的重要组成部分。这些设备执行一项操作,并且专门用于此操作。在与这些设备通信时,我们需要设置一个安全的密钥来防止未经授权的通信。几十年来,我们一直在为电子设备使用即插即用模型。这些物联网设备属于同一领域。即插即用连接模型遵循相同的原则,因此用户不会感受到记住复杂密码或依赖默认凭据的额外压力。它有助于生成只有设备及其用户知道的秘密。我们使用椭圆曲线密码术来规避设备上的资源限制。该模型建立了一个零信任模式,其中所有请求和响应在处理之前都经过验证和验证。本文提供了一种独特的方法来为每个用户和设备对设置密钥,而无需太多用户交互。该模型设置了端到端安全通信的路径。

更新日期:2021-08-29
down
wechat
bug