Análise de Desempenho de um Esquema de Acordo de Chaves de Conferência para IoT
Resumo
Wireless networks and their recent applications in the Internet of Things (IoT) have the evident necessity of mechanisms that increase its exchanged data reliability and integrity. Therefore, key agreement schemes are strong candidates to meet these requirements. Considering the resource constraints in IoT networks, verifying these limitations is vital. In this work, an analysis of computational feasibility and a proposal for using a one-way key agreement method based on second-degree equations for an IoT environment are performed. For the analysis, we simulated a network of up to 50 devices. It considered memory consumption, the time for session key generation, the size of the generated key, and the overhead in time for message exchange. The results show that the method applies to IoT networks, presenting a linear growth in the key agreement time and constant processing even with increasing the key size.
Referências
K. Coelho, D. Damião, G. Noubir, A. Borges, M. Nogueira, and J. Nacif, “Cryptographic algorithms in wearable communications: An empirical analysis,” IEEE Communications Letters, vol. 23, pp. 1931–1934, 2019.
L. A. B. Kowada and R. C. Machado, “Esquema de acordo de chaves de conferência baseado em um problema de funçoes quadraticas de duas variáveis,” in Anais do XVII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. SBC, 2017, pp. 126–139.
B. Vaidya, D. Makrakis, and H. Mouftah, “Two-factor mutual authentication with key agreement in wireless sensor networks,” Security and Communication Networks, vol. 9, no. 2, pp. 171–183, 2016.
K. B. Andrew Banks, Ed Briggs and R. Gupta, “MQTT version 5.0. OASIS standard,” 2019. [Online]. Available: https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.pdf
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.
M. Steiner, G. Tsudik, and M. Waidner, “Diffie-hellman key distribution extended to group communication,” in Proceedings of the 3rd ACM conference on Computer and communications security, 1996.
M. Burmester and Y. Desmedt, “A secure and efficient conference key distribution system,” in Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 1994, pp. 275–286.
H. Xiong, Y. Wu, and Z. Lu, “A survey of group key agreement protocols with constant rounds,” ACM Computing Surveys (CSUR), vol. 52, no. 3, pp. 1–32, 2019.
P. Tedeschi, S. Sciancalepore, A. Eliyan, and R. Di Pietro, “Like: Lightweight certificateless key agreement for secure iot communications,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 621–638, 2019.
A. Garg and T. Lee, “Secure key agreement for multi-device home iot environment,” Internet of Things, p. 100249, 2020.