| Literature DB >> 26343677 |
Leandro Marin1, Marcin Piotr Pawlowski2,3, Antonio Jara4,5.
Abstract
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.Entities:
Keywords: Edwards curves; IPv6; Internet of Things; MSP430; NXP/Jennic 5148; cross-vendor; elliptic curve cryptography; heterogeneous devices; interoperability; large-scale pilots; security
Year: 2015 PMID: 26343677 PMCID: PMC4610516 DOI: 10.3390/s150921478
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Extended star topology representation of a small heterogeneous IoT network with MSP430- and NXP/Jennic 5148-based IoT devices.
Figure 2Star topology representation of small heterogeneous IoT networks comprised of MSP430- and NXP/Jennic 5148-based devices connecting directly to the cloud.
Figure 3Schnorr signatures scheme-based authentication and key negotiation protocol.
Network usage statistics of different Extensible Authentication Protocol (EAP) methods of EAP communication, calculated on the MSP430 node connecting to the NXP/Jennic 5148, during the authentication procedure. TLS, Transport Layer Security.
| TX Packets | TX Data | RX Packets | RX Data | Total Packets | Total Data | |
|---|---|---|---|---|---|---|
| EAP-SCHNORR-MD 5 | 2 | 122 B | 2 | 122 B | 4 | 244 B |
| EAP-SCHNORR-SHA 1 | 2 | 130 B | 2 | 130 B | 4 | 260 B |
| EAP-SCHNORR-SHA256 | 2 | 154 B | 2 | 154 B | 4 | 308 B |
| EAP-SCHNORR-SHA512 | 2 | 218 B | 2 | 218 B | 4 | 436 B |
| EAP-MD5 | 3 | 66 B | 3 | 59 B | 6 | 125 B |
| EAP-PSK | 5 | 181 B | 4 | 160 B | 9 | 341 B |
| EAP-TLS-ECDSA -160 | 12 | 271 B | 17 | 812 B | 29 | 1083 B |
| EAP-TLS-ECDSA-256 | 13 | 286 B | 18 | 931 B | 31 | 1217 B |
| EAP-TLS-RSA -480 | 19 | 376 B | 24 | 1566 B | 43 | 1942 B |
| EAP-TLS-RSA-512 | 20 | 397 B | 25 | 1627 B | 45 | 2024 B |
| EAP-TLS-RSA-1024 | 27 | 496 B | 32 | 2370 B | 59 | 2866 B |
| EAP-TLS-RSA-2048 | 43 | 712 B | 48 | 4200 B | 91 | 4912 B |