Achievable Multi-Security Levels for Lightweight loT-Enabled Devices in Infrastructureless Peer-Aware Communicationsopen access
- Authors
- Nhu-Ngoc Dao; Kim, Yonghun; Jeong, Seohyeon; Park, Minho; Cho, Sungrae
- Issue Date
- Nov-2017
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Multi-security level; infrastructureless peer-aware communication; social networking; lightweight device
- Citation
- IEEE ACCESS, v.5, pp 26743 - 26753
- Pages
- 11
- Journal Title
- IEEE ACCESS
- Volume
- 5
- Start Page
- 26743
- End Page
- 26753
- URI
- https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/6310
- DOI
- 10.1109/ACCESS.2017.2777443
- ISSN
- 2169-3536
- Abstract
- The emergence of social networking and proximity services is driving the Internet-of-Things (IoT) paradigms toward a location-aware connecting society. To prepare for such a booming paradigm, IEEE 802.15.8 standardizes peer-aware communication (PAC) within the strict consideration of infrastructureless property and fully distributed coordination features. Since no central entity exists in a PAC network for control and management purposes, every PAC device (PD) plays an equal role in terms of communication. This situation leads to a variety of security challenges, especially in authentication and key agreement for lightweight IoT-enabled PDs. Recently, there are some proposals aimed at the aforementioned problems, such as approaches with personal identification number, physical layer features. However, due to its inconvenience and computational complexity for the lightweight IoT-enabled PDs, authentication and key agreement are still open issues in PAC. From this view, this paper proposes a new approach that utilizes social networking features closely tied to the PAC in order to support authentication and key agreement procedures. A number of trusted PDs are delegated to authenticate the requesting PD on behalf of the requested PD when an association is established between them. Intensive analysis and evaluation show that the proposed protocol provides multiple security levels as well as user convenience with reasonable resource consumption.
- Files in This Item
-
- Appears in
Collections - College of Software > School of Computer Science and Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.