Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thingin Internet of Things

Article English OPEN
Jung, Seung Wook; Jung, Souhwan;
(2015)
  • Publisher: Hindawi Publishing Corporation
  • Journal: issn: 1550-1329
  • Related identifiers: doi: 10.1155/2015/174383
  • Subject: Electronic computers. Computer science | QA75.5-76.95 | Article Subject

In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. Without the guarantee of establishment of key and trust relationship,... View more
  • References (21)
    21 references, page 1 of 3

    Solo, D., Housley, R., Ford, W.. Internet X.509 public key infrastructure certificate and CRL profile.

    Jennings, C.. Transitive Trust Enrollment for Constrained Devices.

    Kang, N., Oh, S.-H., Yoon, S.. Secure initial-key reconfiguration for resource constrained devices. IETF Draft. 2014

    Bellovin, S. M., Merritt, M.. Encrypted key exchange: password-based protocols secure against dictionary attack. : 72-84

    Boyko, V., MacKenzie, P., Patel, S.. Provably secure password-authenticated key exchange using Diffie-Hellman. Advances in Cryptology—EUROCRYPT 2000. 2000; 1807: 156-171

    MacKenzie, P.. More efficient password-authenticated key exchange. Topics in Cryptology—CT-RSA 2001. 2001; 2020: 361-377

    Jablon, D. P.. Strong password-only authenticated key exchange. ACM SIGCOMM Computer Communication Review. 1996; 26 (5): 5-26

    Bellovin, S. M., Merritt, M.. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. : 244-250

    Jablon, D. P.. Extended password key exchange protocols immune to dictionary attack. : 248-255

    Wu, T. D.. The secure remote password protocol. : 97-111

  • Metrics
    No metrics available
Share - Bookmark