Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol

碩士 === 國立交通大學 === 電機資訊國際學程 === 105 === IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best cho...

Full description

Bibliographic Details
Main Authors: HA, DUY AN, 河惟安
Other Authors: Zao, John Kar Kin
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/81819469752798560149
id ndltd-TW-105NCTU5441004
record_format oai_dc
spelling ndltd-TW-105NCTU54410042017-09-06T04:22:26Z http://ndltd.ncl.edu.tw/handle/81819469752798560149 Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol 以ECQV內蘊公鑰憑證為依據供資源有限的物聯網器件使用的DTLS省便認證方案 HA, DUY AN 河惟安 碩士 國立交通大學 電機資訊國際學程 105 IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best choice if the cost of computation is acceptable for the constrained devices. For that reason, this work will introduce a low-cost public-key cryptography solution for the constrained devices. The solution is developed base on elliptic curve cryptography and Datagram Transport Layer Security (DTLS) protocol. The elliptic curve cryptography, combined with Elliptic Curve Qu-Vanstone (ECQV) implicit certificate, will offer a public-key cryptography solution with low-cost of computation and bandwidth for IoT applications, and by using the standard protocol DTLS, the solution can be accepted widely. The solution is a security protocol consisting of two phases. The first phase is registration phase in which a constrained node need to execute enrolment procedure to authenticate and get an ECQV implicit certificate from the certificate authority of the IoT system. The obtained ECQV implicit certificate is then used for performing authentication and key exchange scheme in the second phase, this phase is called secure key establishment phase. To prove the feasibility of the solution, an implementation of the protocol has been done based on an embedded SSL library – wolfSSL, and an evaluation of execution time of the implementation is also conducted to assess the efficiency of the solution. Zao, John Kar Kin 邵家健 2016 學位論文 ; thesis 49 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 電機資訊國際學程 === 105 === IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best choice if the cost of computation is acceptable for the constrained devices. For that reason, this work will introduce a low-cost public-key cryptography solution for the constrained devices. The solution is developed base on elliptic curve cryptography and Datagram Transport Layer Security (DTLS) protocol. The elliptic curve cryptography, combined with Elliptic Curve Qu-Vanstone (ECQV) implicit certificate, will offer a public-key cryptography solution with low-cost of computation and bandwidth for IoT applications, and by using the standard protocol DTLS, the solution can be accepted widely. The solution is a security protocol consisting of two phases. The first phase is registration phase in which a constrained node need to execute enrolment procedure to authenticate and get an ECQV implicit certificate from the certificate authority of the IoT system. The obtained ECQV implicit certificate is then used for performing authentication and key exchange scheme in the second phase, this phase is called secure key establishment phase. To prove the feasibility of the solution, an implementation of the protocol has been done based on an embedded SSL library – wolfSSL, and an evaluation of execution time of the implementation is also conducted to assess the efficiency of the solution.
author2 Zao, John Kar Kin
author_facet Zao, John Kar Kin
HA, DUY AN
河惟安
author HA, DUY AN
河惟安
spellingShingle HA, DUY AN
河惟安
Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
author_sort HA, DUY AN
title Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
title_short Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
title_full Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
title_fullStr Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
title_full_unstemmed Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
title_sort efficient authentication of resource-constrained iot devices based on ecqv implicit certification algorithm and datagram transport layer security (dtls) protocol
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/81819469752798560149
work_keys_str_mv AT haduyan efficientauthenticationofresourceconstrainediotdevicesbasedonecqvimplicitcertificationalgorithmanddatagramtransportlayersecuritydtlsprotocol
AT héwéiān efficientauthenticationofresourceconstrainediotdevicesbasedonecqvimplicitcertificationalgorithmanddatagramtransportlayersecuritydtlsprotocol
AT haduyan yǐecqvnèiyùngōngyàopíngzhèngwèiyījùgōngzīyuányǒuxiàndewùliánwǎngqìjiànshǐyòngdedtlsshěngbiànrènzhèngfāngàn
AT héwéiān yǐecqvnèiyùngōngyàopíngzhèngwèiyījùgōngzīyuányǒuxiàndewùliánwǎngqìjiànshǐyòngdedtlsshěngbiànrènzhèngfāngàn
_version_ 1718527908238065664