Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Secure Ownership Transfer for Resource Constrained IoT Infrastructures

Gunnarsson, Martin and Gehrmann, Christian LU (2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47
Abstract

Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security... (More)

Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol’s resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. The results presented in this paper, an extend version of previously published work on secure ownership transfer protocols for constrained IoT devices by the same authors.

(Less)
Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Constrained devices, IoT, Ownership transfer
host publication
Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Revised Selected Papers
series title
Communications in Computer and Information Science
editor
Furnell, Steven ; Mori, Paolo ; Weippl, Edgar and Camp, Olivier
volume
1545 CCIS
pages
26 pages
publisher
Springer Science and Business Media B.V.
conference name
6th International Conference on Information Systems Security and Privacy, ICISSP 2020
conference location
Valletta, Malta
conference dates
2020-02-25 - 2020-02-27
external identifiers
  • scopus:85124029226
ISSN
1865-0937
1865-0929
ISBN
9783030948993
DOI
10.1007/978-3-030-94900-6_2
project
Cyber Security for Next Generation Factory (SEC4FACTORY)
language
English
LU publication?
yes
additional info
Publisher Copyright: © 2022, Springer Nature Switzerland AG.
id
3417fbe8-59e4-43f4-bc88-b4fb1a25ca10
date added to LUP
2022-04-06 12:53:46
date last changed
2024-06-05 23:13:25
@inbook{3417fbe8-59e4-43f4-bc88-b4fb1a25ca10,
  abstract     = {{<p>Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol’s resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. The results presented in this paper, an extend version of previously published work on secure ownership transfer protocols for constrained IoT devices by the same authors.</p>}},
  author       = {{Gunnarsson, Martin and Gehrmann, Christian}},
  booktitle    = {{Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Revised Selected Papers}},
  editor       = {{Furnell, Steven and Mori, Paolo and Weippl, Edgar and Camp, Olivier}},
  isbn         = {{9783030948993}},
  issn         = {{1865-0937}},
  keywords     = {{Constrained devices; IoT; Ownership transfer}},
  language     = {{eng}},
  pages        = {{22--47}},
  publisher    = {{Springer Science and Business Media B.V.}},
  series       = {{Communications in Computer and Information Science}},
  title        = {{Secure Ownership Transfer for Resource Constrained IoT Infrastructures}},
  url          = {{http://dx.doi.org/10.1007/978-3-030-94900-6_2}},
  doi          = {{10.1007/978-3-030-94900-6_2}},
  volume       = {{1545 CCIS}},
  year         = {{2022}},
}