loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Giovanni Schmid 1 and Francesco Rossi 2

Affiliations: 1 High Performance Computing and Networking Institute (ICAR), Italy ; 2 University of Naples Parthenope, Italy

ISBN: 978-989-758-084-0

Keyword(s): ID-based Cryptography, Key Agreement, Embedded Device.

Related Ontology Subjects/Areas/Topics: Embedded Communications Systems ; Mobile and Pervasive Computing ; Networking and Connectivity ; Security and Privacy ; Software Architectures ; Telecommunications

Abstract: In recent years, a substantial work has been devoted to the design of cryptographic protocols with reduced computational load and power consumption. However, implementations are scarce, especially in case of embedded devices. In this paper, we discuss the implementation over elliptic curves of a two-party key agreement protocol for the Raspberry PI platform. The protocol requires just one round to derive an (implicit) authenticated session key, and it makes use of identity-based cryptography, which fits very well some application scenarios, allowing for more efficiency than the certificate-based approach. Our implementation takes advantage of the portability and security features of the Java programming language and, due to a modular design, it can be easily extended to encompass other identity-based schemes and protocols. We run a set of tests in order to verify the correctness of our implementation and to measure its performances in term of computing time. Our results demonstrate th at getting secure communications using low cost, resource constrained devices is viable to the point that it can be used for real world applications. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.25.39.138

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Schmid, G. and Rossi, F. (2015). Implementing Identity-based Key Agreement in Embedded Devices.In Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-758-084-0, pages 117-123. DOI: 10.5220/0005242901170123

@conference{peccs15,
author={Giovanni Schmid. and Francesco Rossi.},
title={Implementing Identity-based Key Agreement in Embedded Devices},
booktitle={Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2015},
pages={117-123},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005242901170123},
isbn={978-989-758-084-0},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - Implementing Identity-based Key Agreement in Embedded Devices
SN - 978-989-758-084-0
AU - Schmid, G.
AU - Rossi, F.
PY - 2015
SP - 117
EP - 123
DO - 10.5220/0005242901170123

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.