Pregled bibliografske jedinice broj: 994225
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices // Future generation computer systems, 97 (2019), August 2019; 105-118 doi:10.1016/j.future.2019.02.052 (međunarodna recenzija, članak, znanstveni)
CROSBI ID: 994225 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices
Autori
Perković, Toni ; Čagalj, Mario ; Kovačević, Tonko
Izvornik
Future generation computer systems (0167-739X) 97
(2019), August 2019;
105-118
Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni
Ključne riječi
Wireless devices ; Key deployment ; Visible light channel ; Authentication
Sažetak
Future healthcare systems, smart homes, power managementsystems will all involve a large number of smart inter-connected wireless devices (such as wireless sensor and IoT nodes). One of the major challenges to securing these systems presents loading initial cryptographic credentials into a relatively large number of wireless devices. This challenge is further aggravated by the fact that many of these technologies and systems involve low- cost and highly interface constrained devices — lacking usual wired interfaces, displays, keypads, and alike. In this paper we propose two novel multichannel key deployment schemes for wireless (sensor) networks, LISA and LISAT, that only require a presence of a light source device, such as a multi-touch screen, tablet or a smartphone device. Both key deployment schemes are secret key-based multichannel protocols and are suitable for interface/resource constrained wireless devices. We use one-way visible light channel (VLC) of multitouch screens (the flashing displays) to initialize sensor devices in a secure, usable and scalable way. More interestingly, LISAT protocol is suited for initialization of geographically remote devices via a trusted third party device. We provide formal analysis of the proposed protocols using the automated verification tool. From the user’s perspective of protocol execution, device initialization is quite simple as user simply places the devices on the top of the multitouch screen after which the remaining process is fully automatized. Indeed, through the experiments with 34 users we showed that our solution is user-friendly and has a good performance concerning the time consumption.
Izvorni jezik
Engleski
Znanstvena područja
Elektrotehnika, Računarstvo
POVEZANOST RADA
Ustanove:
Fakultet elektrotehnike, strojarstva i brodogradnje, Split,
Sveučilište u Splitu Sveučilišni odjel za forenzične znanosti,
Sveučilište u Splitu Sveučilišni odjel za stručne studije
Citiraj ovu publikaciju:
Časopis indeksira:
- Current Contents Connect (CCC)
- Web of Science Core Collection (WoSCC)
- Science Citation Index Expanded (SCI-EXP)
- SCI-EXP, SSCI i/ili A&HCI
- Scopus