Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol
碩士 === 國立交通大學 === 電機資訊國際學程 === 105 === IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best cho...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/81819469752798560149 |
id |
ndltd-TW-105NCTU5441004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NCTU54410042017-09-06T04:22:26Z http://ndltd.ncl.edu.tw/handle/81819469752798560149 Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol 以ECQV內蘊公鑰憑證為依據供資源有限的物聯網器件使用的DTLS省便認證方案 HA, DUY AN 河惟安 碩士 國立交通大學 電機資訊國際學程 105 IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best choice if the cost of computation is acceptable for the constrained devices. For that reason, this work will introduce a low-cost public-key cryptography solution for the constrained devices. The solution is developed base on elliptic curve cryptography and Datagram Transport Layer Security (DTLS) protocol. The elliptic curve cryptography, combined with Elliptic Curve Qu-Vanstone (ECQV) implicit certificate, will offer a public-key cryptography solution with low-cost of computation and bandwidth for IoT applications, and by using the standard protocol DTLS, the solution can be accepted widely. The solution is a security protocol consisting of two phases. The first phase is registration phase in which a constrained node need to execute enrolment procedure to authenticate and get an ECQV implicit certificate from the certificate authority of the IoT system. The obtained ECQV implicit certificate is then used for performing authentication and key exchange scheme in the second phase, this phase is called secure key establishment phase. To prove the feasibility of the solution, an implementation of the protocol has been done based on an embedded SSL library – wolfSSL, and an evaluation of execution time of the implementation is also conducted to assess the efficiency of the solution. Zao, John Kar Kin 邵家健 2016 學位論文 ; thesis 49 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 電機資訊國際學程 === 105 === IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best choice if the cost of computation is acceptable for the constrained devices. For that reason, this work will introduce a low-cost public-key cryptography solution for the constrained devices. The solution is developed base on elliptic curve cryptography and Datagram Transport Layer Security (DTLS) protocol. The elliptic curve cryptography, combined with Elliptic Curve Qu-Vanstone (ECQV) implicit certificate, will offer a public-key cryptography solution with low-cost of computation and bandwidth for IoT applications, and by using the standard protocol DTLS, the solution can be accepted widely. The solution is a security protocol consisting of two phases. The first phase is registration phase in which a constrained node need to execute enrolment procedure to authenticate and get an ECQV implicit certificate from the certificate authority of the IoT system. The obtained ECQV implicit certificate is then used for performing authentication and key exchange scheme in the second phase, this phase is called secure key establishment phase. To prove the feasibility of the solution, an implementation of the protocol has been done based on an embedded SSL library – wolfSSL, and an evaluation of execution time of the implementation is also conducted to assess the efficiency of the solution.
|
author2 |
Zao, John Kar Kin |
author_facet |
Zao, John Kar Kin HA, DUY AN 河惟安 |
author |
HA, DUY AN 河惟安 |
spellingShingle |
HA, DUY AN 河惟安 Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol |
author_sort |
HA, DUY AN |
title |
Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol |
title_short |
Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol |
title_full |
Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol |
title_fullStr |
Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol |
title_full_unstemmed |
Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol |
title_sort |
efficient authentication of resource-constrained iot devices based on ecqv implicit certification algorithm and datagram transport layer security (dtls) protocol |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/81819469752798560149 |
work_keys_str_mv |
AT haduyan efficientauthenticationofresourceconstrainediotdevicesbasedonecqvimplicitcertificationalgorithmanddatagramtransportlayersecuritydtlsprotocol AT héwéiān efficientauthenticationofresourceconstrainediotdevicesbasedonecqvimplicitcertificationalgorithmanddatagramtransportlayersecuritydtlsprotocol AT haduyan yǐecqvnèiyùngōngyàopíngzhèngwèiyījùgōngzīyuányǒuxiàndewùliánwǎngqìjiànshǐyòngdedtlsshěngbiànrènzhèngfāngàn AT héwéiān yǐecqvnèiyùngōngyàopíngzhèngwèiyījùgōngzīyuányǒuxiàndewùliánwǎngqìjiànshǐyòngdedtlsshěngbiànrènzhèngfāngàn |
_version_ |
1718527908238065664 |