Pseudonym and Key Management Scheme for Supporting Social Smart Applications

Yusuke FUKUSHIMA  Ved P. KAFLE  Hiroaki HARAI  

Publication
IEICE TRANSACTIONS on Communications   Vol.E101-B   No.8   pp.1775-1786
Publication Date: 2018/08/01
Online ISSN: 1745-1345
DOI: 10.1587/transcom.2017ADP0004
Type of Manuscript: Special Section PAPER (Special Section on Autonomous Decentralized Systems Technologies and Approaches Innovation through Structure Change of Society and Life)
Category: 
Keyword: 
internet of things,  pseudonym,  privacy-preserving wireless communication,  identity-based cryptography,  

Full Text: PDF(2.1MB)
>>Buy this Article


Summary: 
Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.