

You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption

Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption
Computational complexity of public key cryptography over sensor nodes is not anymore a blocking concern in modern devices which natively (and efficiently) support elliptic curve cryptography. The problem has rather shifted toward the significant airtime consumption required to exchange multiple messages and certificates so as to perform authentication and key agreement. This letter addresses such problem by exploiting implicit certificates (elliptic curve Qu-Vanstone). We specifically propose a novel key management protocol (KMP) which suitably integrates implicit certificates with a standard elliptic curve Diffie-Hellman exchange, and performs authentication and key derivation. As confirmed by a proof-of-concept implementation and relevant experimental results, the proposed KMP guarantees maximal airtime savings (up to 86.7%) with respect to conventional approaches, robust key negotiation, fast rekeying, and efficient protection against replay attacks.
Microsoft Academic Graph classification: SPEKE Theoretical computer science Computer science Public-key cryptography Elliptic curve cryptography Key size business.industry Elliptic curve Diffie–Hellman Elliptic Curve Digital Signature Algorithm Key (cryptography) business Implicit certificate Computer network
IoT, General Computer Science, security, industrial IoT, Elliptic curve cryptography (ECC); elliptic curve Diffie-Hellman (ECDH); elliptic curve Qu-Vanstone (ECQV); industrial IoT; key management; security; X.509; Control and Systems Engineering; Computer Science (all), key management, elliptic curve Qu-Vanstone (ECQV), X.509, Computer Science (all), elliptic curve Diffie-Hellman (ECDH), Elliptic curve cryptography (ECC), Control and Systems Engineering, Elliptic curve cryptography (ECC); elliptic curve; Diffie-Hellman (ECDH); elliptic curve Qu-Vanstone (ECQV); industrial IoT; key management; security; X.509, Settore ING-INF/03 - TELECOMUNICAZIONI, authentication, Diffie-Hellman (ECDH), elliptic curve
IoT, General Computer Science, security, industrial IoT, Elliptic curve cryptography (ECC); elliptic curve Diffie-Hellman (ECDH); elliptic curve Qu-Vanstone (ECQV); industrial IoT; key management; security; X.509; Control and Systems Engineering; Computer Science (all), key management, elliptic curve Qu-Vanstone (ECQV), X.509, Computer Science (all), elliptic curve Diffie-Hellman (ECDH), Elliptic curve cryptography (ECC), Control and Systems Engineering, Elliptic curve cryptography (ECC); elliptic curve; Diffie-Hellman (ECDH); elliptic curve Qu-Vanstone (ECQV); industrial IoT; key management; security; X.509, Settore ING-INF/03 - TELECOMUNICAZIONI, authentication, Diffie-Hellman (ECDH), elliptic curve
Microsoft Academic Graph classification: SPEKE Theoretical computer science Computer science Public-key cryptography Elliptic curve cryptography Key size business.industry Elliptic curve Diffie–Hellman Elliptic Curve Digital Signature Algorithm Key (cryptography) business Implicit certificate Computer network
3 Research products, page 1 of 1
- 2019IsAmongTopNSimilarDocuments
- 2020IsAmongTopNSimilarDocuments
- 2020IsAmongTopNSimilarDocuments
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).66 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Top 10% influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Top 10% impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Top 1% visibility views 195 download downloads 472 citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).66 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Top 10% influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Top 10% impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Top 1% Powered byBIP!
- 195views472downloads



- Funder: European Commission (EC)
- Project Code: 688156
- Funding stream: H2020 | RIA
Computational complexity of public key cryptography over sensor nodes is not anymore a blocking concern in modern devices which natively (and efficiently) support elliptic curve cryptography. The problem has rather shifted toward the significant airtime consumption required to exchange multiple messages and certificates so as to perform authentication and key agreement. This letter addresses such problem by exploiting implicit certificates (elliptic curve Qu-Vanstone). We specifically propose a novel key management protocol (KMP) which suitably integrates implicit certificates with a standard elliptic curve Diffie-Hellman exchange, and performs authentication and key derivation. As confirmed by a proof-of-concept implementation and relevant experimental results, the proposed KMP guarantees maximal airtime savings (up to 86.7%) with respect to conventional approaches, robust key negotiation, fast rekeying, and efficient protection against replay attacks.