The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Tanto atribuir a responsabilidade pelo envio de mensagens a cada objeto IoT quanto ofuscar a localização do objeto de outros objetos são essenciais para realizar um serviço de comunicação seguro e com privacidade preservada. Dois ou mais identificadores de link de curta duração (ou pseudônimos) autorizados por uma autoridade confiável são frequentemente usados em estudos relacionados, em vez de um identificador de link de uso persistente ou de longo prazo (ou seja, endereço MAC atribuído pelo fornecedor). No entanto, estudos relacionados têm limitações em termos de mudança frequente de pseudônimos para aumentar a privacidade da localização, porque os algoritmos criptográficos usados neles acoplam fixamente os identificadores do objeto com suas chaves de segurança. Para superar essas limitações, apresentamos um novo esquema de gerenciamento de pseudônimos e chaves que permite o acoplamento dinâmico de pseudônimos e pares de chaves sem incorrer em quaisquer impactos adversos. Além disso, propomos dois protocolos leves de alocação de pseudônimos para reduzir efetivamente o volume de mensagens que transportam os parâmetros de alocação. Através de análises qualitativas, verificamos que o esquema proposto é mais escalável do que abordagens relacionadas, pois pode alocar com eficiência um número suficiente de pares de pseudônimos/chaves, reduzindo o overhead da mensagem de controle em mais de 90%.
Yusuke FUKUSHIMA
National Institute of Information and Communications Technology
Ved P. KAFLE
National Institute of Information and Communications Technology
Hiroaki HARAI
National Institute of Information and Communications Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Yusuke FUKUSHIMA, Ved P. KAFLE, Hiroaki HARAI, "Pseudonym and Key Management Scheme for Supporting Social Smart Applications" in IEICE TRANSACTIONS on Communications,
vol. E101-B, no. 8, pp. 1775-1786, August 2018, doi: 10.1587/transcom.2017ADP0004.
Abstract: Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2017ADP0004/_p
Copiar
@ARTICLE{e101-b_8_1775,
author={Yusuke FUKUSHIMA, Ved P. KAFLE, Hiroaki HARAI, },
journal={IEICE TRANSACTIONS on Communications},
title={Pseudonym and Key Management Scheme for Supporting Social Smart Applications},
year={2018},
volume={E101-B},
number={8},
pages={1775-1786},
abstract={Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.},
keywords={},
doi={10.1587/transcom.2017ADP0004},
ISSN={1745-1345},
month={August},}
Copiar
TY - JOUR
TI - Pseudonym and Key Management Scheme for Supporting Social Smart Applications
T2 - IEICE TRANSACTIONS on Communications
SP - 1775
EP - 1786
AU - Yusuke FUKUSHIMA
AU - Ved P. KAFLE
AU - Hiroaki HARAI
PY - 2018
DO - 10.1587/transcom.2017ADP0004
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E101-B
IS - 8
JA - IEICE TRANSACTIONS on Communications
Y1 - August 2018
AB - Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.
ER -