For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Pseudonym and Key Management Scheme for Supporting Social Smart Applications
Yusuke FUKUSHIMA Ved P. KAFLE Hiroaki HARAI
IEICE TRANSACTIONS on Communications
Publication Date: 2018/08/01
Online ISSN: 1745-1345
Type of Manuscript: Special Section PAPER (Special Section on Autonomous Decentralized Systems Technologies and Approaches Innovation through Structure Change of Society and Life)
internet of things, pseudonym, privacy-preserving wireless communication, identity-based cryptography,
Full Text: PDF(2.1MB)
>>Buy this Article
Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.