When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World

Conventional Key Management Protocols establish secure communication channels by using asymmetric cryptography based on “fixed” public keys. In the Internet of Things context, it is preferable to have a good level of freshness of the cryptographic material. But efficient solutions leveraging “ephemeral” public keys are not available yet. The work presented herein solves this problem by conceiving a novel key agreement methodology integrating the Blockchain technology. Specifically, Blockchain is used to store X.509 certificates related to the initial fixed public keys of devices, to publish new ephemeral public keys, and to help the verification of the authenticity of ephemeral public keys without sending signatures and additional X.509 certificates. A preliminary comparison against Transport Layer Security protocol and other customized key agreement schema presented in the literature demonstrates that the proposed approach registers low communication overhead, limited energy consumptions, and acceptable communication latencies while ensuring the lowest memory footprint.

[1]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[2]  Kazumaro Aoki,et al.  SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .

[3]  Giuseppe Piro,et al.  Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption , 2017, IEEE Embedded Systems Letters.

[4]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[5]  Evgeny M. Khorov,et al.  A survey on IEEE 802.11ah: An enabling networking technology for smart cities , 2015, Comput. Commun..

[6]  Emanuele Frontoni,et al.  Certificate Validation Through Public Ledgers and Blockchains , 2017, ITASEC.

[7]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[8]  Zhang Zhe,et al.  A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[9]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[10]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[11]  Dmitry Khovratovich,et al.  BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[12]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[13]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[14]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[15]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[16]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[17]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[18]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.