TY - JOUR
T1 - EXCHANge
T2 - Securing IoT via channel anonymity
AU - Sciancalepore, Savio
AU - Oligeri, Gabriele
AU - Piro, Giuseppe
AU - Boggia, Gennaro
AU - Di Pietro, Roberto
N1 - Funding Information:
This work was framed in the context of the project SymbIoTe, which receives funding from the European Union’s Horizon 2020 research and innovation programme, Italy under grant agreement 688156 . The findings achieved herein are solely responsibility of the authors.
Publisher Copyright:
© 2018 Elsevier B.V.
PY - 2019/1/15
Y1 - 2019/1/15
N2 - Establishing confidentiality between communicating peers is still an issue in contexts where solutions based on asymmetric keys are not viable, such as in dynamic Internet of Things (IoT) systems made up of heterogeneous and resource constrained devices. From the current literature, channel anonymity emerges as a promising methodology able to support key-establishment protocols. But, to the best of authors’ knowledge, no works already demonstrated its practical adoption over a concrete communication technology. To bridge this gap, we experimentally show that a lightweight key-establishment protocol based on channel anonymity is viable. The contributions of this work are mainfold. First, we introduce EXCHANge, a protocol that achieves key-establishment exploiting channel anonymity despite the presence of either a passive or active global-eavesdropper adversary. Second, we evaluate the performance of EXCHANge through an extensive experimental campaign involving real world IoT devices (OpenMote-CC2538). Our results demonstrate that the proposed solution introduces a limited overhead, thus being able to meet the requirements of resource constrained devices Finally, we experimentally demonstrate the security of the EXCHANge protocol against passive and active adversaries. Overall, this paper proves that channel anonymity can be a powerful tool in the IoT setting, to achieve a secure, effective, and efficient key-establishment.
AB - Establishing confidentiality between communicating peers is still an issue in contexts where solutions based on asymmetric keys are not viable, such as in dynamic Internet of Things (IoT) systems made up of heterogeneous and resource constrained devices. From the current literature, channel anonymity emerges as a promising methodology able to support key-establishment protocols. But, to the best of authors’ knowledge, no works already demonstrated its practical adoption over a concrete communication technology. To bridge this gap, we experimentally show that a lightweight key-establishment protocol based on channel anonymity is viable. The contributions of this work are mainfold. First, we introduce EXCHANge, a protocol that achieves key-establishment exploiting channel anonymity despite the presence of either a passive or active global-eavesdropper adversary. Second, we evaluate the performance of EXCHANge through an extensive experimental campaign involving real world IoT devices (OpenMote-CC2538). Our results demonstrate that the proposed solution introduces a limited overhead, thus being able to meet the requirements of resource constrained devices Finally, we experimentally demonstrate the security of the EXCHANge protocol against passive and active adversaries. Overall, this paper proves that channel anonymity can be a powerful tool in the IoT setting, to achieve a secure, effective, and efficient key-establishment.
KW - Channel anonymity
KW - Experimentation
KW - IEEE 802.15.4
KW - IoT
KW - Key agreement
UR - http://www.scopus.com/inward/record.url?scp=85059063822&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2018.11.003
DO - 10.1016/j.comcom.2018.11.003
M3 - Article
AN - SCOPUS:85059063822
SN - 0140-3664
VL - 134
SP - 14
EP - 29
JO - Computer Communications
JF - Computer Communications
ER -