Privacy-Aware Authentication in the Internet of Things

Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Abstract

Besides the opportunities offered by the all-embracing Internet of Things (IoT) technology, it also poses a tremendous threat to the privacy of the carriers of these devices. In this work, we build upon the idea of an RFID-based IoT realized by means of standardized and well-established Internet protocols. In particular, we demonstrate how the Internet Protocol Security protocol suite (IPsec) can be applied in a privacy-aware manner. Therefore, we introduce a privacy-aware mutual authentication protocol compatible with restrictions imposed by the IPsec standard and analyze its privacy and security properties. In order do so, we revisit and adapt the RFID privacy model (HPVP) of Hermans et al. (ESORICS'11). With this work, we show that privacy in the IoT can be achieved without relying on proprietary protocols and on the basis of existing Internet standards.
Originalspracheenglisch
Titel14th International Conference on Cryptology and Network Security (CANS 2015)
Herausgeber (Verlag)Springer Verlag
Seiten32-39
Band9476
AuflageLNCS
DOIs
PublikationsstatusVeröffentlicht - 2015
VeranstaltungInternational Conference on Cryptology and Network Security - Marrakesh, Marokko
Dauer: 10 Dez 201512 Dez 2015

Publikationsreihe

NameLecture Notes in Computer Science
Herausgeber (Verlag)Springer

Konferenz

KonferenzInternational Conference on Cryptology and Network Security
LandMarokko
OrtMarrakesh
Zeitraum10/12/1512/12/15

    Fingerprint

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Theoretical

Dieses zitieren

Groß, H., Hölbl, M., Slamanig, D., & Spreitzer, R. (2015). Privacy-Aware Authentication in the Internet of Things. in 14th International Conference on Cryptology and Network Security (CANS 2015) (LNCS Aufl., Band 9476, S. 32-39). (Lecture Notes in Computer Science). Springer Verlag. https://doi.org/10.1007/978-3-319-26823-1_3