*banner
 

A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities
Hokeun Kim, Armin Wasicek, Benjamin Mehne, Edward A. Lee

Citation
Hokeun Kim, Armin Wasicek, Benjamin Mehne, Edward A. Lee. "A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities". The 4th IEEE International Conference on Future Internet of Things and Cloud, August, 2016.

Abstract
Security is essential to enable the Internet of Things (IoT). Key security measures that work well on the traditional Internet, however, do not necessarily adapt well to the IoT. Specifically, authentication and/or authorization based on certificates provided by certificate authorities (CAs) cannot, in current form, scale to the expected 50 billion devices. And widely used encryption technologies for the Internet require too much energy for resource-constrained devices. This paper describes a secure network architecture with key distribution mechanisms using local, automated authorization entities. The architecture provides security guarantees while addressing IoT-related issues including resource constraints. For evaluation, we show that the architecture's overhead scales at a significantly slower rate than widely used SSL/TLS and works well with resource-constrained devices.

Electronic downloads

Citation formats  
  • HTML
    Hokeun Kim, Armin Wasicek, Benjamin Mehne, Edward A. Lee.
    <a
    href="http://chess.eecs.berkeley.edu/pubs/1175.html"
    >A Secure Network Architecture for the Internet of Things
    Based on Local Authorization Entities</a>, The 4th
    IEEE International Conference on Future Internet of Things
    and Cloud, August, 2016.
  • Plain text
    Hokeun Kim, Armin Wasicek, Benjamin Mehne, Edward A. Lee.
    "A Secure Network Architecture for the Internet of
    Things Based on Local Authorization Entities". The 4th
    IEEE International Conference on Future Internet of Things
    and Cloud, August, 2016.
  • BibTeX
    @inproceedings{KimWasicekMehneLee16_SecureNetworkArchitectureForInternetOfThingsBasedOnLocal,
        author = {Hokeun Kim and Armin Wasicek and Benjamin Mehne
                  and Edward A. Lee},
        title = {A Secure Network Architecture for the Internet of
                  Things Based on Local Authorization Entities},
        booktitle = {The 4th IEEE International Conference on Future
                  Internet of Things and Cloud},
        month = {August},
        year = {2016},
        abstract = {Security is essential to enable the Internet of
                  Things (IoT). Key security measures that work well
                  on the traditional Internet, however, do not
                  necessarily adapt well to the IoT. Specifically,
                  authentication and/or authorization based on
                  certificates provided by certificate authorities
                  (CAs) cannot, in current form, scale to the
                  expected 50 billion devices. And widely used
                  encryption technologies for the Internet require
                  too much energy for resource-constrained devices.
                  This paper describes a secure network architecture
                  with key distribution mechanisms using local,
                  automated authorization entities. The architecture
                  provides security guarantees while addressing
                  IoT-related issues including resource constraints.
                  For evaluation, we show that the architecture's
                  overhead scales at a significantly slower rate
                  than widely used SSL/TLS and works well with
                  resource-constrained devices.},
        URL = {http://chess.eecs.berkeley.edu/pubs/1175.html}
    }
    

Posted by Hokeun Kim on 12 Jun 2016.
Groups: chess
For additional information, see the Publications FAQ or contact webmaster at chess eecs berkeley edu.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.

©2002-2018 Chess