Skip to main content

2018 | OriginalPaper | Buchkapitel

Pairing-Based Cryptography on the Internet of Things: A Feasibility Study

verfasst von : Ioanna Karantaidou, Spyros T. Halkidis, Sophia Petridou, Lefteris Mamatas, George Stephanides

Erschienen in: Wired/Wireless Internet Communications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Pairing-based cryptography (PBC) has recently received much attention, since the mathematical building block of pairings paved the ground for devising efficient cryptographic protocols exploiting an old inspiration, i.e., to produce the public key of an entity based on its identity. The so-called Identity-Based Cryptography (IBC) simplifies key management procedures, since it does not require certificate-based infrastructures. Moreover, it is an elliptic curve cryptosystem which entails that it offers the same security levels as other public key systems with much smaller key lengths. The above characteristics make it an attractive solution for resource-constrained environments such as the Internet of Things (IoT), where strong confidentiality and signature schemes are necessary. In this article, we conducted feasibility tests of pairing-based cryptography for middle-class IoT devices, such as the Raspberry Pi 3 platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The Internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef Atzori, L., Iera, A., Morabito, G.: The Internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef
2.
Zurück zum Zitat Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisoni, A.: Security, privacy and trust in the Internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisoni, A.: Security, privacy and trust in the Internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef
3.
Zurück zum Zitat Moody, D., Peralta, R., Perlner, R., Regenscheid, A., Roginsky, A., Chen, L.: Report on pairing-based cryptography. J. Res. Natl. Inst. Stand. Technol. 120, 11–27 (2015)CrossRef Moody, D., Peralta, R., Perlner, R., Regenscheid, A., Roginsky, A., Chen, L.: Report on pairing-based cryptography. J. Res. Natl. Inst. Stand. Technol. 120, 11–27 (2015)CrossRef
7.
Zurück zum Zitat Aranha, D.F., Gouvêa, C.P.L.: RELIC is an Efficient Library for Cryptography (2013) Aranha, D.F., Gouvêa, C.P.L.: RELIC is an Efficient Library for Cryptography (2013)
8.
Zurück zum Zitat Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRef Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRef
9.
Zurück zum Zitat Galbraith, S.D., Kenneth, K.G., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(6), 3113–3121 (2008)MathSciNetCrossRef Galbraith, S.D., Kenneth, K.G., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(6), 3113–3121 (2008)MathSciNetCrossRef
13.
Zurück zum Zitat Szczechowiak, P., Kargl, A., Scott, A., Collier, M.: On the application of pairing based cryptography to wireless sensor networks. In: Proceedings of the 2nd ACM Conference on Wireless network security, pp. 1–12 (2009) Szczechowiak, P., Kargl, A., Scott, A., Collier, M.: On the application of pairing based cryptography to wireless sensor networks. In: Proceedings of the 2nd ACM Conference on Wireless network security, pp. 1–12 (2009)
14.
Zurück zum Zitat Mandal, M., Sharma, G., Bala, S., Verma, A.K.: Feasibility of public key cryptography in wireless sensor networks. J. Theor. Phys. Cryptogr. 7, 20–24 (2014) Mandal, M., Sharma, G., Bala, S., Verma, A.K.: Feasibility of public key cryptography in wireless sensor networks. J. Theor. Phys. Cryptogr. 7, 20–24 (2014)
15.
Zurück zum Zitat Jacobsen, R.H., Mikkelsen, S.A., Rasmussen, N.H.: Towards the use of pairing-based cryptography for resource-constrained home area networks. In: Proceedings of the 2015 Euromicro Conference on Digital System Design. IEEE, Portugal (2015) Jacobsen, R.H., Mikkelsen, S.A., Rasmussen, N.H.: Towards the use of pairing-based cryptography for resource-constrained home area networks. In: Proceedings of the 2015 Euromicro Conference on Digital System Design. IEEE, Portugal (2015)
16.
Zurück zum Zitat Oliveira, L.B., Scott, M., López, J., Dahab, R.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485–493 (2011)CrossRef Oliveira, L.B., Scott, M., López, J., Dahab, R.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485–493 (2011)CrossRef
18.
Zurück zum Zitat Ambrosin, M., et al.: On the feasibility of attribute based encryption on Internet of things devices. IEEE Micro 36(6), 25–35 (2016)CrossRef Ambrosin, M., et al.: On the feasibility of attribute based encryption on Internet of things devices. IEEE Micro 36(6), 25–35 (2016)CrossRef
Metadaten
Titel
Pairing-Based Cryptography on the Internet of Things: A Feasibility Study
verfasst von
Ioanna Karantaidou
Spyros T. Halkidis
Sophia Petridou
Lefteris Mamatas
George Stephanides
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-02931-9_18