Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lightweight Mutual Authentication for IoT and Its Applications

Similar presentations


Presentation on theme: "Lightweight Mutual Authentication for IoT and Its Applications"— Presentation transcript:

1 Lightweight Mutual Authentication for IoT and Its Applications
Source: IEEE Transactions on Sustainable Computing, ahead of print, online 19 June 2017 Author: Nan Li, Dongxi Liu, and Surya Nepal Speaker: Nguyen Ngoc Tu Date: 2017/09/14 Green: environmentally friendly

2 Introduction Scenario Smart city Device B Device A
Intercept: Delete, modify, fabricate ; corrupt: clients Device A Device B

3 Outline Introduction Proposed scheme Conclusions Encryption Scheme
Mutual Authentication Scheme Conclusions

4 Proposed scheme Lightweight Encryption Scheme (1/7) Setup KeyGen
Decryption Contribution

5 Proposed scheme Lightweight Encryption Scheme (2/7) Setup
the modulo of (the domain of coordinators of private/public keys) the modulo of (the domain of input messages) the modulo of (the domain of random numbers) the number of public key vectors the dimension of the private/public key vectors the number of public vectors which are utilized for encryption phase the maximum length of plaintext Contribution

6 Proposed scheme Lightweight Encryption Scheme (3/7) KeyGen
Secret key where for all Public keys Contribution

7 Proposed scheme Lightweight Encryption Scheme (4/7) Encryption
Step 1,2 Randomly select sub-matrix Compute Contribution Step 3

8 Proposed scheme Lightweight Encryption Scheme (5/7) Decryption Compute
Contribution

9 Proposed scheme Lightweight Encryption Scheme (6/7)
Details (correctness) Contribution

10 Proposed scheme: Outline
Lightweight Encryption Scheme (7/7) Correctness Contribution

11 Proposed scheme Mutual Authentication Scheme (1/7) Setup
Key Generation Initialization Mutual Authentication Contribution

12 Proposed scheme Mutual Authentication Scheme (2/7) Setup
the modulo of (the domain of coordinators of private/public keys) the modulo of (the domain of input messages) the modulo of (the domain of random numbers) the number of public key vectors the dimension of the private/public key vectors the number of public vectors which are utilized for encryption phase the maximum length of plaintext Contribution the number of nonces

13 Proposed scheme Mutual Authentication Scheme (3/7) KeyGen
Secret key where for all Public keys Contribution

14 Proposed scheme Mutual Authentication Scheme (4/7) Initialization
Devices A: Devices B: A and B securely exchange their identities and public keys The information may pre-configured to devices by an authorized users Contribution

15 Proposed scheme Mutual Authentication Scheme (5/7)
Contribution

16 Performance comparison
Implementation AAKE: Device-to-device mutual authentication using CC2538 evaluation modules and Contiki OS

17 Security and computation cost comparisons
Performance comparison Security and computation cost comparisons AAKE:

18 Conclusions Low computation cost
The number of security bits may be flexibly chosen Automated Validation of Internet Security Protocols and Applications.


Download ppt "Lightweight Mutual Authentication for IoT and Its Applications"

Similar presentations


Ads by Google