Análise de Desempenho de um Esquema de Acordo de Chaves de Conferência para IoT

  • Mateus Coutinho Marim UFJF
  • Kristtopher K. Coelho UFV
  • Alex B. Vieira UFJF
  • José Augusto M. Nacif UFV
  • Michele Nogueira UFMG
  • Edelberto Franco Silva UFJF

Resumo


Wireless networks and their recent applications in the Internet of Things (IoT) have the evident necessity of mechanisms that increase its exchanged data reliability and integrity. Therefore, key agreement schemes are strong candidates to meet these requirements. Considering the resource constraints in IoT networks, verifying these limitations is vital. In this work, an analysis of computational feasibility and a proposal for using a one-way key agreement method based on second-degree equations for an IoT environment are performed. For the analysis, we simulated a network of up to 50 devices. It considered memory consumption, the time for session key generation, the size of the generated key, and the overhead in time for message exchange. The results show that the method applies to IoT networks, presenting a linear growth in the key agreement time and constant processing even with increasing the key size.

Palavras-chave: Acordo de Chaves, IoT

Referências

K. K. Coelho, M. Nogueira, M. C. Marim, E. F. Silva, A. B. Vieira, and J. A. M. Nacif, “Lorena: Low memory symmetric-key generation method for based on group cryptography protocol applied to the internet of healthcare things,” IEEE Access, vol. 10, pp. 12 564–12 579, 2022.

K. Coelho, D. Damião, G. Noubir, A. Borges, M. Nogueira, and J. Nacif, “Cryptographic algorithms in wearable communications: An empirical analysis,” IEEE Communications Letters, vol. 23, pp. 1931–1934, 2019.

L. A. B. Kowada and R. C. Machado, “Esquema de acordo de chaves de conferência baseado em um problema de funçoes quadraticas de duas variáveis,” in Anais do XVII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. SBC, 2017, pp. 126–139.

B. Vaidya, D. Makrakis, and H. Mouftah, “Two-factor mutual authentication with key agreement in wireless sensor networks,” Security and Communication Networks, vol. 9, no. 2, pp. 171–183, 2016.

K. B. Andrew Banks, Ed Briggs and R. Gupta, “MQTT version 5.0. OASIS standard,” 2019. [Online]. Available: https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.pdf

W. Diffie and M. Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.

M. Steiner, G. Tsudik, and M. Waidner, “Diffie-hellman key distribution extended to group communication,” in Proceedings of the 3rd ACM conference on Computer and communications security, 1996.

M. Burmester and Y. Desmedt, “A secure and efficient conference key distribution system,” in Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 1994, pp. 275–286.

H. Xiong, Y. Wu, and Z. Lu, “A survey of group key agreement protocols with constant rounds,” ACM Computing Surveys (CSUR), vol. 52, no. 3, pp. 1–32, 2019.

P. Tedeschi, S. Sciancalepore, A. Eliyan, and R. Di Pietro, “Like: Lightweight certificateless key agreement for secure iot communications,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 621–638, 2019.

A. Garg and T. Lee, “Secure key agreement for multi-device home iot environment,” Internet of Things, p. 100249, 2020.
Publicado
21/11/2023
Como Citar

Selecione um Formato
MARIM, Mateus Coutinho; COELHO, Kristtopher K.; VIEIRA, Alex B.; NACIF, José Augusto M.; NOGUEIRA, Michele; SILVA, Edelberto Franco. Análise de Desempenho de um Esquema de Acordo de Chaves de Conferência para IoT. In: TRABALHOS EM ANDAMENTO - SIMPÓSIO BRASILEIRO DE ENGENHARIA DE SISTEMAS COMPUTACIONAIS (SBESC), 13. , 2023, Porto Alegre/RS. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2023 . p. 67-70. ISSN 2763-9002. DOI: https://doi.org/10.5753/sbesc_estendido.2023.235823.