(k, n) threshold distributed key exchange for HIP based internet of things

Host Identity Protocol (HIP) emerges as the most suitable identification protocol for the Internet of Things. HIP not only provides identifier/locator split but also a key agreement procedure named HIP Base Exchange, which bootstraps security associations between HIP peers. However, the heterogeneous and decentralized nature of IoT architecture, coupling resource-constrained networks with powerful Internet, impedes the use of HIP Base Exchange on small devices due to its computationally expensive cryptographic operations. In this paper, we propose a (k, n) threshold distributed key exchange protocol designed to reduce the requirements of HIP Base Exchange, in order to be supported by resource-constrained nodes.

[1]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[2]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[3]  Pekka Nikander,et al.  An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID) , 2007, RFC.

[4]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM '04.

[5]  Geng Wu,et al.  M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.

[6]  Marcelo Bagnulo,et al.  Shim6: Level 3 Multihoming Shim Protocol for IPv6 , 2009, RFC.

[7]  Jeongyeup Paek,et al.  A wireless sensor network for structural health monitoring: performance and experience , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..

[8]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[9]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[10]  Sarvar Patel,et al.  Password-Authenticated Key (PAK) Diffie-Hellman Exchange , 2010, RFC.

[11]  Nelly Fazio,et al.  Cryptographic Accumulators: Definitions, Constructions and Applications , 2002 .

[12]  Luigi Iannone,et al.  Evaluating the benefits of the locator/identifier separation , 2007, MobiArch '07.