Pseudonym and Key Management Scheme for Supporting Social Smart Applications

  • FUKUSHIMA Yusuke
    Network Science and Convergence Device Technology Laboratory, Network System Institute, National Institute of Information and Communications Technology
  • KAFLE Ved P.
    Network Science and Convergence Device Technology Laboratory, Network System Institute, National Institute of Information and Communications Technology
  • HARAI Hiroaki
    Network Science and Convergence Device Technology Laboratory, Network System Institute, National Institute of Information and Communications Technology

抄録

<p>Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.</p>

収録刊行物

参考文献 (14)*注記

もっと見る

詳細情報

問題の指摘

ページトップへ