The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Il est essentiel de confier la responsabilité de l'envoi des messages à chaque objet IoT et de masquer l'emplacement de l'objet par rapport aux autres objets pour réaliser un service de communication sécurisé et préservant la confidentialité. Deux ou plusieurs identifiants de lien de courte durée (ou pseudonymes) autorisés par une autorité fiable sont souvent utilisés dans des études connexes, au lieu d'un identifiant de lien persistant ou à long terme (c'est-à-dire l'adresse MAC attribuée par le fournisseur). Cependant, les études connexes présentent des limites en termes de changement fréquent de pseudonymes pour améliorer la confidentialité de la localisation, car les algorithmes cryptographiques utilisés associent de manière fixe les identifiants de l'objet à ses clés de sécurité. Pour surmonter ces limitations, nous présentons un nouveau schéma de gestion des pseudonymes et des clés qui permet un couplage dynamique des paires de pseudonymes et de clés sans subir d'impacts négatifs. De plus, nous proposons deux protocoles légers d’allocation de pseudonymes pour réduire efficacement le volume de messages transportant les paramètres d’allocation. Grâce à des analyses qualitatives, nous vérifions que le schéma proposé est plus évolutif que les approches associées, car il peut allouer efficacement un nombre suffisant de paires pseudonyme/clé en réduisant la surcharge des messages de contrôle de plus de 90 %.
Yusuke FUKUSHIMA
National Institute of Information and Communications Technology
Ved P. KAFLE
National Institute of Information and Communications Technology
Hiroaki HARAI
National Institute of Information and Communications Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Yusuke FUKUSHIMA, Ved P. KAFLE, Hiroaki HARAI, "Pseudonym and Key Management Scheme for Supporting Social Smart Applications" in IEICE TRANSACTIONS on Communications,
vol. E101-B, no. 8, pp. 1775-1786, August 2018, doi: 10.1587/transcom.2017ADP0004.
Abstract: Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2017ADP0004/_p
Copier
@ARTICLE{e101-b_8_1775,
author={Yusuke FUKUSHIMA, Ved P. KAFLE, Hiroaki HARAI, },
journal={IEICE TRANSACTIONS on Communications},
title={Pseudonym and Key Management Scheme for Supporting Social Smart Applications},
year={2018},
volume={E101-B},
number={8},
pages={1775-1786},
abstract={Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.},
keywords={},
doi={10.1587/transcom.2017ADP0004},
ISSN={1745-1345},
month={August},}
Copier
TY - JOUR
TI - Pseudonym and Key Management Scheme for Supporting Social Smart Applications
T2 - IEICE TRANSACTIONS on Communications
SP - 1775
EP - 1786
AU - Yusuke FUKUSHIMA
AU - Ved P. KAFLE
AU - Hiroaki HARAI
PY - 2018
DO - 10.1587/transcom.2017ADP0004
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E101-B
IS - 8
JA - IEICE TRANSACTIONS on Communications
Y1 - August 2018
AB - Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.
ER -