ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications
Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for large-scale, low-cost applications, the use of trusted third parties is subject to human error and leaked credentials. For this context, co-locat...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on dependable and secure computing Jg. 20; H. 5; S. 1 - 16 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Washington
IEEE
01.09.2023
IEEE Computer Society |
| Schlagworte: | |
| ISSN: | 1545-5971, 1941-0018 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for large-scale, low-cost applications, the use of trusted third parties is subject to human error and leaked credentials. For this context, co-location can be a valuable resource, and it is often exploited through common randomness harvesting techniques, but these, in turn, suffer from low achievable rates and usually from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend in the vicinity of the transmitter to find a secret key by collecting enough consecutive clues. By contrast, attackers are afforded only limited time to listen to, or interact with, the clue transmitter. Previous work in this direction deals solely with passive attackers and uses high-overhead information throttling mechanisms. This paper introduces the active attacker model for the quality-time paradigm and proposes a simple solution, a Zeroconf Key Establishment Protocol (ZeroProKeS). Additionally, the paper shows how to efficiently expand the proposed protocol to adhere to any customized information transfer function between legitimate users. |
|---|---|
| AbstractList | Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for large-scale, low-cost applications, the use of trusted third parties is subject to human error and leaked credentials. For this context, co-location can be a valuable resource, and it is often exploited through common randomness harvesting techniques, but these, in turn, suffer from low achievable rates and usually from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend in the vicinity of the transmitter to find a secret key by collecting enough consecutive clues. By contrast, attackers are afforded only limited time to listen to, or interact with, the clue transmitter. Previous work in this direction deals solely with passive attackers and uses high-overhead information throttling mechanisms. This paper introduces the active attacker model for the quality-time paradigm and proposes a simple solution, a Zeroconf Key Establishment Protocol (ZeroProKeS). Additionally, the paper shows how to efficiently expand the proposed protocol to adhere to any customized information transfer function between legitimate users. |
| Author | Amariucai, George T Guan, Yong Sakib, Shahnewaz Karim |
| Author_xml | – sequence: 1 givenname: Shahnewaz Karim orcidid: 0000-0002-5043-3061 surname: Sakib fullname: Sakib, Shahnewaz Karim organization: Department of Electrical and Computer Engineering, Iowa State University, USA – sequence: 2 givenname: George T orcidid: 0000-0003-4471-6425 surname: Amariucai fullname: Amariucai, George T organization: Department of Computer Science, Kansas State University, USA – sequence: 3 givenname: Yong orcidid: 0000-0003-0445-1848 surname: Guan fullname: Guan, Yong organization: Department of Electrical and Computer Engineering, Iowa State University, USA |
| BookMark | eNo9kEtLw0AQgBepYFv9AeJlwXPqPrtZb6XWBw0opF48GDabiaak2bibIv33JrR4mmHmmxnmm6BR4xpA6JqSGaVE320e0uWMEcZmnBGlmTpDY6oFjQih8ajPpZCR1IpeoEkIW0KYiLUYo88P8O7NuzWk93iBU7B7D3goWteUeA0HvAqdyesqfO-g6XDPdn2vxqXzODH-C6LUmhpw4n6jpQsdXrRtXVnTVa4Jl-i8NHWAq1OcovfH1Wb5HCWvTy_LRRJZJmQX8YJJY1hucqk0LzhVWioyZ5JLLqjJFbEsLoDl5bzMhZAgdS4MjwvObMks4VN0e9zbevezh9BlW7f3TX8yY_HwtlJU9hQ9Uta7EDyUWeurnfGHjJJs0JgNGrNBY3bS2M_cHGcqAPjndawlp4T_AaTab04 |
| CODEN | ITDSCM |
| Cites_doi | 10.1145/3032970.3032987 10.1145/586115.586117 10.1145/1409944.1409960 10.1145/359168.359176 10.1155/2019/5935292 10.1109/18.243431 10.1109/TDSC.2016.2605087 10.1109/SP.2018.00041 10.1109/TIFS.2017.2659640 10.1109/TDSC.2006.2 10.1137/0108018 10.46586/tches.v2019.i2.132-161 10.1364/AOP.361502 10.1016/j.adhoc.2018.07.030 10.1016/j.jcss.2008.04.002 10.1109/TIFS.2016.2550424 10.1145/1102199.1102205 10.1145/941350.941371 10.1145/3212480.3212507 10.1109/TMC.2011.271 10.17487/RFC8236 10.1007/978-3-030-01446-9_21 10.1007/s001459900023 10.1109/ISIT.2017.8006873 10.1109/JSYST.2019.2899580 10.1109/ISIT.2006.262101 10.1109/SP.2016.25 10.1016/0166-218X(79)90012-X 10.1109/TIFS.2010.2043187 10.1007/978-3-319-78372-7_15 10.1007/978-3-319-52153-4_11 10.1109/MWC.2011.5999759 10.1109/18.256484 10.1109/CICSYN.2013.42 10.1109/SP.2014.15 10.1109/TIT.1976.1055638 10.1145/2660267.2660334 10.1109/TIFS.2018.2866025 10.1109/ITW.2003.1216713 10.1109/BigData47090.2019.9006318 10.1002/j.1538-7305.1975.tb02040.x 10.1145/1102219.1102233 10.1109/TIT.1978.1055892 10.1109/TDSC.2021.3129512 10.1109/SP.2012.44 10.1109/TIT.2011.2173629 |
| ContentType | Journal Article |
| Copyright | Copyright IEEE Computer Society 2023 |
| Copyright_xml | – notice: Copyright IEEE Computer Society 2023 |
| DBID | 97E RIA RIE AAYXX CITATION JQ2 |
| DOI | 10.1109/TDSC.2022.3207927 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1941-0018 |
| EndPage | 16 |
| ExternalDocumentID | 10_1109_TDSC_2022_3207927 9895310 |
| Genre | orig-research |
| GroupedDBID | .4S .DC 0R~ 29I 4.4 5GY 5VS 6IK 7WY 8FE 8FG 8FL 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJCF ABQJQ ABUWG ABVLG ACGFO ACIWK AENEX AETIX AFKRA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZQEC BEFXN BENPR BEZIV BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CS3 DU5 DWQXO EBS EDO EJD FRNLG GNUQQ HCIFZ HZ~ IEDLZ IFIPE IPLJI ITG ITH JAVBF K60 K6V K6~ K7- L6V LAI M0C M43 M7S O9- OCL P2P P62 PHGZM PHGZT PQBIZ PQBZA PQGLB PQQKQ PROAC PTHSS PUEGO Q2X RIA RIE RNI RNS RZB AAYXX CITATION JQ2 |
| ID | FETCH-LOGICAL-c245t-3d25aa2bab5793d317957062535341ab70c28de2bf6fb445e59b4a38d32cf2c03 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001144489500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1545-5971 |
| IngestDate | Thu Sep 25 00:43:31 EDT 2025 Sat Nov 29 03:48:45 EST 2025 Wed Aug 27 02:29:12 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c245t-3d25aa2bab5793d317957062535341ab70c28de2bf6fb445e59b4a38d32cf2c03 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-0445-1848 0000-0003-4471-6425 0000-0002-5043-3061 |
| PQID | 2859717715 |
| PQPubID | 27603 |
| PageCount | 16 |
| ParticipantIDs | proquest_journals_2859717715 ieee_primary_9895310 crossref_primary_10_1109_TDSC_2022_3207927 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-09-01 |
| PublicationDateYYYYMMDD | 2023-09-01 |
| PublicationDate_xml | – month: 09 year: 2023 text: 2023-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Washington |
| PublicationPlace_xml | – name: Washington |
| PublicationTitle | IEEE transactions on dependable and secure computing |
| PublicationTitleAbbrev | TDSC |
| PublicationYear | 2023 |
| Publisher | IEEE IEEE Computer Society |
| Publisher_xml | – name: IEEE – name: IEEE Computer Society |
| References | ref13 ref57 ref12 ref56 ref59 ref14 ref58 ref53 ref11 ref55 ref10 li (ref51) 2018 ref17 ref16 ref19 ref18 studio (ref64) 2017 mcfarlane (ref6) 2019 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 (ref65) 2021 menezes (ref61) 1996 ref8 ref7 gao (ref52) 2017 ref9 ding (ref49) 2012 juels (ref54) 2014 ref5 rogaway (ref60) 2007; 6 ref40 ref35 ref34 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref38 juels (ref24) 2004 castle (ref66) 2020 ye (ref15) 2010; 5 ref23 epcglobal (ref26) 2004; 65 ref25 becerra (ref50) 2017 ref20 steinberg (ref3) 2005 ref22 karatsuba (ref62) 1963; 7 ref21 amariucai (ref4) 2011 gao (ref37) 2017 ref28 ref27 ref29 roche (ref39) 2021 pi (ref63) 2015 |
| References_xml | – year: 2005 ident: ref3 publication-title: Zero Configuration Networking The Definitive Guide The Definitive Guide – ident: ref18 doi: 10.1145/3032970.3032987 – year: 2019 ident: ref6 publication-title: How Toyota Makes Money – start-page: 99 year: 2017 ident: ref52 article-title: Post-quantum secure remote password protocol from RLWE problem publication-title: Proc Int Conf Informat Secur Cryptol – start-page: 231 year: 2021 ident: ref39 article-title: A side journey to titan publication-title: Proc 30th USENIX Secur Symp – start-page: 27 year: 2017 ident: ref50 article-title: Tightly-secure PAK(E) publication-title: Proc Int Conf Cryptol Netw Secur – volume: 65 year: 2004 ident: ref26 article-title: Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 Mhz-960 Mhz version 1.0. 9 publication-title: K Chiew/On False Authenticationsfor C1G2 Passive RFID Tags – ident: ref21 doi: 10.1145/586115.586117 – ident: ref27 doi: 10.1145/1409944.1409960 – ident: ref7 doi: 10.1145/359168.359176 – ident: ref45 doi: 10.1155/2019/5935292 – ident: ref29 doi: 10.1109/18.243431 – ident: ref43 doi: 10.1109/TDSC.2016.2605087 – ident: ref20 doi: 10.1109/SP.2018.00041 – ident: ref40 doi: 10.1109/TIFS.2017.2659640 – ident: ref22 doi: 10.1109/TDSC.2006.2 – ident: ref58 doi: 10.1137/0108018 – ident: ref38 doi: 10.46586/tches.v2019.i2.132-161 – ident: ref48 doi: 10.1364/AOP.361502 – ident: ref46 doi: 10.1016/j.adhoc.2018.07.030 – ident: ref41 doi: 10.1016/j.jcss.2008.04.002 – ident: ref12 doi: 10.1109/TIFS.2016.2550424 – ident: ref25 doi: 10.1145/1102199.1102205 – ident: ref9 doi: 10.1145/941350.941371 – ident: ref5 doi: 10.1145/3212480.3212507 – ident: ref19 doi: 10.1109/TMC.2011.271 – ident: ref35 doi: 10.17487/RFC8236 – year: 2020 ident: ref66 – ident: ref34 doi: 10.1007/978-3-030-01446-9_21 – ident: ref30 doi: 10.1007/s001459900023 – ident: ref13 doi: 10.1109/ISIT.2017.8006873 – ident: ref47 doi: 10.1109/JSYST.2019.2899580 – ident: ref31 doi: 10.1109/ISIT.2006.262101 – year: 2017 ident: ref64 article-title: Android studio publication-title: The Official IDE for Android – start-page: 108 year: 2011 ident: ref4 article-title: An automatic, time-based, secure pairing protocol for passive RFID publication-title: Radio Frequency Identification: Security and Privacy Issues – ident: ref2 doi: 10.1109/SP.2016.25 – ident: ref53 doi: 10.1016/0166-218X(79)90012-X – volume: 7 start-page: 595 year: 1963 ident: ref62 article-title: Multiplication of multidigit numbers on automata publication-title: Sov Phys Doklady – volume: 5 start-page: 240 year: 2010 ident: ref15 article-title: Information-theoretically secret key generation for fading wireless channels publication-title: IEEE Trans Inf Forensics Security doi: 10.1109/TIFS.2010.2043187 – volume: 6 year: 2007 ident: ref60 article-title: Deterministic authenticated-encryption publication-title: Advances in Cryptology -CRYPTO – year: 2014 ident: ref54 article-title: Secret sharing in cryptographic devices via controlled release of plaintext information – start-page: 149 year: 2004 ident: ref24 article-title: Minimalist cryptography for low-cost RFID tags publication-title: Proc Int Conf Secur Commun Netw – ident: ref33 doi: 10.1007/978-3-319-78372-7_15 – ident: ref36 doi: 10.1007/978-3-319-52153-4_11 – ident: ref16 doi: 10.1109/MWC.2011.5999759 – ident: ref28 doi: 10.1109/18.256484 – year: 2017 ident: ref37 article-title: Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS publication-title: Cryptology-eprint-archive – year: 2021 ident: ref65 – year: 2012 ident: ref49 article-title: A simple provably secure key exchange scheme based on the learning with errors problem publication-title: Cryptology-eprint-archive – ident: ref8 doi: 10.1109/CICSYN.2013.42 – start-page: 138 year: 2018 ident: ref51 article-title: Two-round PAKE protocol over lattices without NIZK publication-title: Proc Int Conf Inf Secur Cryptol – year: 2015 ident: ref63 article-title: Raspberry Pi 3 model B – ident: ref1 doi: 10.1109/SP.2014.15 – year: 1996 ident: ref61 publication-title: Handbook of Applied Cryptography – ident: ref59 doi: 10.1109/TIT.1976.1055638 – ident: ref17 doi: 10.1145/2660267.2660334 – ident: ref44 doi: 10.1109/TIFS.2018.2866025 – ident: ref55 doi: 10.1137/0108018 – ident: ref32 doi: 10.1109/ITW.2003.1216713 – ident: ref56 doi: 10.1109/BigData47090.2019.9006318 – ident: ref11 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref23 doi: 10.1145/1102219.1102233 – ident: ref10 doi: 10.1109/TIT.1978.1055892 – ident: ref42 doi: 10.1109/TDSC.2021.3129512 – ident: ref57 doi: 10.1109/SP.2012.44 – ident: ref14 doi: 10.1109/TIT.2011.2173629 |
| SSID | ssj0024894 |
| Score | 2.3379827 |
| Snippet | Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Authentication Cryptography Cybersecurity Erasure coding Human error Information transfer Internet of Things key establishment Low cost Protocols RFID tags security protocols Sensors set intersection Throttling Transfer functions Trusted third parties zeroconf |
| Title | ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications |
| URI | https://ieeexplore.ieee.org/document/9895310 https://www.proquest.com/docview/2859717715 |
| Volume | 20 |
| WOSCitedRecordID | wos001144489500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1941-0018 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: RIE dateStart: 20040101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1BS8MwFA5zePDi1ClOp-TgSYymabO03sZ0CBtjsAnDg6VpXkGQVbZO8d_7knZT0Iu30r7S8l6S73vJSz5CLmSiwxCBgSnoGIYIlTGEBc1SnuFICJkxvBSbUKNROJtF4xq52uyFAQBXfAbX9tKt5Zs8XdmpspsojLDJYIK-pVSn3Kv1fa5e6EQPLSNgSJK9agXT49HN9G7Sw0xQiGtfcBVZAZkfGOREVX6NxA5e-o3__dge2a1oJO2Wcd8nNZgfkMZaooFWPbZJnp9gkY8X-QAmt7RL3ew6UHsT8-CMDuCT3iM_dFNR9hsUbQt89kqRzNKhLRNnEwwj0GH-wXr5sqDdH0veh-Sxfz_tPbBKUoGlIpAF842QSSJ0oiV2TIPkIZKKYw7kS4SzRCueitCA0Fkn00EgQUY6SPzQ-CLNRMr9I1Kf53M4JjTloKX00SJBVuKpkGvwPMOxaWoIMmiRy7WT47fy5IzYZRw8im1EYhuRuIpIizStVzeGlUNbpL0OS1z1rWVsj9zDJFR58uTvt07JjhWFLyvB2qReLFZwRrbT9-JluTh3zeYL0f3AQg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED6GCvrib3H-zINPYjRNG9v6NqYy2RyDTRAfLE1zBUFW2TrF_95L1k1BX3wr7ZWWuyTfd8klH8CJSnUUETDwEC8NJ4TKOcGC5pnIaSTE3BgxFZsIu93o8THu1eBsvhcGEV3xGZ7bS7eWb4psYqfKLuIopiZDCfqiVc6qdmt9n6wXOdlDywk40WSvWsP0RHwxuO43KReU8tyXIoythMwPFHKyKr_GYgcwt2v_-7V1WK2IJGtMI78BNRxuwtpMpIFVfXYLnp9wVPRGRRv7V6zB3Pw6MnuTMuGctfGT3RBDdJNR9huMbEt69sqIzrKOLRTnfQoksk7xwZvFuGSNH4ve2_BwezNotnglqsAzGaiS-0aqNJU61Yq6piH6EKtQUBbkKwK0VIcik5FBqfPLXAeBQhXrIPUj48ssl5nwd2BhWAxxF1gmUCvlk0VKvMQLI6HR84ygxqkxyLEOpzMnJ2_TszMSl3OIOLERSWxEkioiddiyXp0bVg6tw8EsLEnVu8aJPXSP0tDQU3t_v3UMy63BfSfp3HXb-7BiJeKndWEHsFCOJngIS9l7-TIeHbkm9AUCaMOL |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ZeroProKeS%3A+A+Secure+Zeroconf+Key+Establishment+Protocol+for+Large-Scale+Low-Cost+Applications&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Shahnewaz+Karim+Sakib&rft.au=Amariucai%2C+George+T&rft.au=Guan%2C+Yong&rft.date=2023-09-01&rft.pub=IEEE+Computer+Society&rft.issn=1545-5971&rft.eissn=1941-0018&rft.volume=20&rft.issue=5&rft.spage=3636&rft_id=info:doi/10.1109%2FTDSC.2022.3207927&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon |