Download presentation
Presentation is loading. Please wait.
Published byAgnes Lloyd Modified over 6 years ago
1
Lightweight Mutual Authentication for IoT and Its Applications
Source: IEEE Transactions on Sustainable Computing, ahead of print, online 19 June 2017 Author: Nan Li, Dongxi Liu, and Surya Nepal Speaker: Nguyen Ngoc Tu Date: 2017/09/14 Green: environmentally friendly
2
Introduction Scenario Smart city Device B Device A
Intercept: Delete, modify, fabricate ; corrupt: clients Device A Device B
3
Outline Introduction Proposed scheme Conclusions Encryption Scheme
Mutual Authentication Scheme Conclusions
4
Proposed scheme Lightweight Encryption Scheme (1/7) Setup KeyGen
Decryption Contribution
5
Proposed scheme Lightweight Encryption Scheme (2/7) Setup
the modulo of (the domain of coordinators of private/public keys) the modulo of (the domain of input messages) the modulo of (the domain of random numbers) the number of public key vectors the dimension of the private/public key vectors the number of public vectors which are utilized for encryption phase the maximum length of plaintext Contribution
6
Proposed scheme Lightweight Encryption Scheme (3/7) KeyGen
Secret key where for all Public keys Contribution
7
Proposed scheme Lightweight Encryption Scheme (4/7) Encryption
Step 1,2 Randomly select sub-matrix Compute Contribution Step 3
8
Proposed scheme Lightweight Encryption Scheme (5/7) Decryption Compute
Contribution
9
Proposed scheme Lightweight Encryption Scheme (6/7)
Details (correctness) Contribution
10
Proposed scheme: Outline
Lightweight Encryption Scheme (7/7) Correctness Contribution
11
Proposed scheme Mutual Authentication Scheme (1/7) Setup
Key Generation Initialization Mutual Authentication Contribution
12
Proposed scheme Mutual Authentication Scheme (2/7) Setup
the modulo of (the domain of coordinators of private/public keys) the modulo of (the domain of input messages) the modulo of (the domain of random numbers) the number of public key vectors the dimension of the private/public key vectors the number of public vectors which are utilized for encryption phase the maximum length of plaintext Contribution the number of nonces
13
Proposed scheme Mutual Authentication Scheme (3/7) KeyGen
Secret key where for all Public keys Contribution
14
Proposed scheme Mutual Authentication Scheme (4/7) Initialization
Devices A: Devices B: A and B securely exchange their identities and public keys The information may pre-configured to devices by an authorized users Contribution
15
Proposed scheme Mutual Authentication Scheme (5/7)
Contribution
16
Performance comparison
Implementation AAKE: Device-to-device mutual authentication using CC2538 evaluation modules and Contiki OS
17
Security and computation cost comparisons
Performance comparison Security and computation cost comparisons AAKE:
18
Conclusions Low computation cost
The number of security bits may be flexibly chosen Automated Validation of Internet Security Protocols and Applications.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.