ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications

Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for large-scale, low-cost applications, the use of trusted third parties is subject to human error and leaked credentials. For this context, co-locat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing Jg. 20; H. 5; S. 1 - 16
Hauptverfasser: Sakib, Shahnewaz Karim, Amariucai, George T, Guan, Yong
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Washington IEEE 01.09.2023
IEEE Computer Society
Schlagworte:
ISSN:1545-5971, 1941-0018
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for large-scale, low-cost applications, the use of trusted third parties is subject to human error and leaked credentials. For this context, co-location can be a valuable resource, and it is often exploited through common randomness harvesting techniques, but these, in turn, suffer from low achievable rates and usually from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend in the vicinity of the transmitter to find a secret key by collecting enough consecutive clues. By contrast, attackers are afforded only limited time to listen to, or interact with, the clue transmitter. Previous work in this direction deals solely with passive attackers and uses high-overhead information throttling mechanisms. This paper introduces the active attacker model for the quality-time paradigm and proposes a simple solution, a Zeroconf Key Establishment Protocol (ZeroProKeS). Additionally, the paper shows how to efficiently expand the proposed protocol to adhere to any customized information transfer function between legitimate users.
AbstractList Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for large-scale, low-cost applications, the use of trusted third parties is subject to human error and leaked credentials. For this context, co-location can be a valuable resource, and it is often exploited through common randomness harvesting techniques, but these, in turn, suffer from low achievable rates and usually from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend in the vicinity of the transmitter to find a secret key by collecting enough consecutive clues. By contrast, attackers are afforded only limited time to listen to, or interact with, the clue transmitter. Previous work in this direction deals solely with passive attackers and uses high-overhead information throttling mechanisms. This paper introduces the active attacker model for the quality-time paradigm and proposes a simple solution, a Zeroconf Key Establishment Protocol (ZeroProKeS). Additionally, the paper shows how to efficiently expand the proposed protocol to adhere to any customized information transfer function between legitimate users.
Author Amariucai, George T
Guan, Yong
Sakib, Shahnewaz Karim
Author_xml – sequence: 1
  givenname: Shahnewaz Karim
  orcidid: 0000-0002-5043-3061
  surname: Sakib
  fullname: Sakib, Shahnewaz Karim
  organization: Department of Electrical and Computer Engineering, Iowa State University, USA
– sequence: 2
  givenname: George T
  orcidid: 0000-0003-4471-6425
  surname: Amariucai
  fullname: Amariucai, George T
  organization: Department of Computer Science, Kansas State University, USA
– sequence: 3
  givenname: Yong
  orcidid: 0000-0003-0445-1848
  surname: Guan
  fullname: Guan, Yong
  organization: Department of Electrical and Computer Engineering, Iowa State University, USA
BookMark eNo9kEtLw0AQgBepYFv9AeJlwXPqPrtZb6XWBw0opF48GDabiaak2bibIv33JrR4mmHmmxnmm6BR4xpA6JqSGaVE320e0uWMEcZmnBGlmTpDY6oFjQih8ajPpZCR1IpeoEkIW0KYiLUYo88P8O7NuzWk93iBU7B7D3goWteUeA0HvAqdyesqfO-g6XDPdn2vxqXzODH-C6LUmhpw4n6jpQsdXrRtXVnTVa4Jl-i8NHWAq1OcovfH1Wb5HCWvTy_LRRJZJmQX8YJJY1hucqk0LzhVWioyZ5JLLqjJFbEsLoDl5bzMhZAgdS4MjwvObMks4VN0e9zbevezh9BlW7f3TX8yY_HwtlJU9hQ9Uta7EDyUWeurnfGHjJJs0JgNGrNBY3bS2M_cHGcqAPjndawlp4T_AaTab04
CODEN ITDSCM
Cites_doi 10.1145/3032970.3032987
10.1145/586115.586117
10.1145/1409944.1409960
10.1145/359168.359176
10.1155/2019/5935292
10.1109/18.243431
10.1109/TDSC.2016.2605087
10.1109/SP.2018.00041
10.1109/TIFS.2017.2659640
10.1109/TDSC.2006.2
10.1137/0108018
10.46586/tches.v2019.i2.132-161
10.1364/AOP.361502
10.1016/j.adhoc.2018.07.030
10.1016/j.jcss.2008.04.002
10.1109/TIFS.2016.2550424
10.1145/1102199.1102205
10.1145/941350.941371
10.1145/3212480.3212507
10.1109/TMC.2011.271
10.17487/RFC8236
10.1007/978-3-030-01446-9_21
10.1007/s001459900023
10.1109/ISIT.2017.8006873
10.1109/JSYST.2019.2899580
10.1109/ISIT.2006.262101
10.1109/SP.2016.25
10.1016/0166-218X(79)90012-X
10.1109/TIFS.2010.2043187
10.1007/978-3-319-78372-7_15
10.1007/978-3-319-52153-4_11
10.1109/MWC.2011.5999759
10.1109/18.256484
10.1109/CICSYN.2013.42
10.1109/SP.2014.15
10.1109/TIT.1976.1055638
10.1145/2660267.2660334
10.1109/TIFS.2018.2866025
10.1109/ITW.2003.1216713
10.1109/BigData47090.2019.9006318
10.1002/j.1538-7305.1975.tb02040.x
10.1145/1102219.1102233
10.1109/TIT.1978.1055892
10.1109/TDSC.2021.3129512
10.1109/SP.2012.44
10.1109/TIT.2011.2173629
ContentType Journal Article
Copyright Copyright IEEE Computer Society 2023
Copyright_xml – notice: Copyright IEEE Computer Society 2023
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
DOI 10.1109/TDSC.2022.3207927
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1941-0018
EndPage 16
ExternalDocumentID 10_1109_TDSC_2022_3207927
9895310
Genre orig-research
GroupedDBID .4S
.DC
0R~
29I
4.4
5GY
5VS
6IK
7WY
8FE
8FG
8FL
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJCF
ABQJQ
ABUWG
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AFKRA
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATWAV
AZQEC
BEFXN
BENPR
BEZIV
BFFAM
BGLVJ
BGNUA
BKEBE
BPEOZ
BPHCQ
CCPQU
CS3
DU5
DWQXO
EBS
EDO
EJD
FRNLG
GNUQQ
HCIFZ
HZ~
IEDLZ
IFIPE
IPLJI
ITG
ITH
JAVBF
K60
K6V
K6~
K7-
L6V
LAI
M0C
M43
M7S
O9-
OCL
P2P
P62
PHGZM
PHGZT
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PTHSS
PUEGO
Q2X
RIA
RIE
RNI
RNS
RZB
AAYXX
CITATION
JQ2
ID FETCH-LOGICAL-c245t-3d25aa2bab5793d317957062535341ab70c28de2bf6fb445e59b4a38d32cf2c03
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001144489500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1545-5971
IngestDate Thu Sep 25 00:43:31 EDT 2025
Sat Nov 29 03:48:45 EST 2025
Wed Aug 27 02:29:12 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c245t-3d25aa2bab5793d317957062535341ab70c28de2bf6fb445e59b4a38d32cf2c03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0445-1848
0000-0003-4471-6425
0000-0002-5043-3061
PQID 2859717715
PQPubID 27603
PageCount 16
ParticipantIDs proquest_journals_2859717715
ieee_primary_9895310
crossref_primary_10_1109_TDSC_2022_3207927
PublicationCentury 2000
PublicationDate 2023-09-01
PublicationDateYYYYMMDD 2023-09-01
PublicationDate_xml – month: 09
  year: 2023
  text: 2023-09-01
  day: 01
PublicationDecade 2020
PublicationPlace Washington
PublicationPlace_xml – name: Washington
PublicationTitle IEEE transactions on dependable and secure computing
PublicationTitleAbbrev TDSC
PublicationYear 2023
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref13
ref57
ref12
ref56
ref59
ref14
ref58
ref53
ref11
ref55
ref10
li (ref51) 2018
ref17
ref16
ref19
ref18
studio (ref64) 2017
mcfarlane (ref6) 2019
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
(ref65) 2021
menezes (ref61) 1996
ref8
ref7
gao (ref52) 2017
ref9
ding (ref49) 2012
juels (ref54) 2014
ref5
rogaway (ref60) 2007; 6
ref40
ref35
ref34
ref36
ref31
ref30
ref33
ref32
ref2
ref1
ref38
juels (ref24) 2004
castle (ref66) 2020
ye (ref15) 2010; 5
ref23
epcglobal (ref26) 2004; 65
ref25
becerra (ref50) 2017
ref20
steinberg (ref3) 2005
ref22
karatsuba (ref62) 1963; 7
ref21
amariucai (ref4) 2011
gao (ref37) 2017
ref28
ref27
ref29
roche (ref39) 2021
pi (ref63) 2015
References_xml – year: 2005
  ident: ref3
  publication-title: Zero Configuration Networking The Definitive Guide The Definitive Guide
– ident: ref18
  doi: 10.1145/3032970.3032987
– year: 2019
  ident: ref6
  publication-title: How Toyota Makes Money
– start-page: 99
  year: 2017
  ident: ref52
  article-title: Post-quantum secure remote password protocol from RLWE problem
  publication-title: Proc Int Conf Informat Secur Cryptol
– start-page: 231
  year: 2021
  ident: ref39
  article-title: A side journey to titan
  publication-title: Proc 30th USENIX Secur Symp
– start-page: 27
  year: 2017
  ident: ref50
  article-title: Tightly-secure PAK(E)
  publication-title: Proc Int Conf Cryptol Netw Secur
– volume: 65
  year: 2004
  ident: ref26
  article-title: Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 Mhz-960 Mhz version 1.0. 9
  publication-title: K Chiew/On False Authenticationsfor C1G2 Passive RFID Tags
– ident: ref21
  doi: 10.1145/586115.586117
– ident: ref27
  doi: 10.1145/1409944.1409960
– ident: ref7
  doi: 10.1145/359168.359176
– ident: ref45
  doi: 10.1155/2019/5935292
– ident: ref29
  doi: 10.1109/18.243431
– ident: ref43
  doi: 10.1109/TDSC.2016.2605087
– ident: ref20
  doi: 10.1109/SP.2018.00041
– ident: ref40
  doi: 10.1109/TIFS.2017.2659640
– ident: ref22
  doi: 10.1109/TDSC.2006.2
– ident: ref58
  doi: 10.1137/0108018
– ident: ref38
  doi: 10.46586/tches.v2019.i2.132-161
– ident: ref48
  doi: 10.1364/AOP.361502
– ident: ref46
  doi: 10.1016/j.adhoc.2018.07.030
– ident: ref41
  doi: 10.1016/j.jcss.2008.04.002
– ident: ref12
  doi: 10.1109/TIFS.2016.2550424
– ident: ref25
  doi: 10.1145/1102199.1102205
– ident: ref9
  doi: 10.1145/941350.941371
– ident: ref5
  doi: 10.1145/3212480.3212507
– ident: ref19
  doi: 10.1109/TMC.2011.271
– ident: ref35
  doi: 10.17487/RFC8236
– year: 2020
  ident: ref66
– ident: ref34
  doi: 10.1007/978-3-030-01446-9_21
– ident: ref30
  doi: 10.1007/s001459900023
– ident: ref13
  doi: 10.1109/ISIT.2017.8006873
– ident: ref47
  doi: 10.1109/JSYST.2019.2899580
– ident: ref31
  doi: 10.1109/ISIT.2006.262101
– year: 2017
  ident: ref64
  article-title: Android studio
  publication-title: The Official IDE for Android
– start-page: 108
  year: 2011
  ident: ref4
  article-title: An automatic, time-based, secure pairing protocol for passive RFID
  publication-title: Radio Frequency Identification: Security and Privacy Issues
– ident: ref2
  doi: 10.1109/SP.2016.25
– ident: ref53
  doi: 10.1016/0166-218X(79)90012-X
– volume: 7
  start-page: 595
  year: 1963
  ident: ref62
  article-title: Multiplication of multidigit numbers on automata
  publication-title: Sov Phys Doklady
– volume: 5
  start-page: 240
  year: 2010
  ident: ref15
  article-title: Information-theoretically secret key generation for fading wireless channels
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2010.2043187
– volume: 6
  year: 2007
  ident: ref60
  article-title: Deterministic authenticated-encryption
  publication-title: Advances in Cryptology -CRYPTO
– year: 2014
  ident: ref54
  article-title: Secret sharing in cryptographic devices via controlled release of plaintext information
– start-page: 149
  year: 2004
  ident: ref24
  article-title: Minimalist cryptography for low-cost RFID tags
  publication-title: Proc Int Conf Secur Commun Netw
– ident: ref33
  doi: 10.1007/978-3-319-78372-7_15
– ident: ref36
  doi: 10.1007/978-3-319-52153-4_11
– ident: ref16
  doi: 10.1109/MWC.2011.5999759
– ident: ref28
  doi: 10.1109/18.256484
– year: 2017
  ident: ref37
  article-title: Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS
  publication-title: Cryptology-eprint-archive
– year: 2021
  ident: ref65
– year: 2012
  ident: ref49
  article-title: A simple provably secure key exchange scheme based on the learning with errors problem
  publication-title: Cryptology-eprint-archive
– ident: ref8
  doi: 10.1109/CICSYN.2013.42
– start-page: 138
  year: 2018
  ident: ref51
  article-title: Two-round PAKE protocol over lattices without NIZK
  publication-title: Proc Int Conf Inf Secur Cryptol
– year: 2015
  ident: ref63
  article-title: Raspberry Pi 3 model B
– ident: ref1
  doi: 10.1109/SP.2014.15
– year: 1996
  ident: ref61
  publication-title: Handbook of Applied Cryptography
– ident: ref59
  doi: 10.1109/TIT.1976.1055638
– ident: ref17
  doi: 10.1145/2660267.2660334
– ident: ref44
  doi: 10.1109/TIFS.2018.2866025
– ident: ref55
  doi: 10.1137/0108018
– ident: ref32
  doi: 10.1109/ITW.2003.1216713
– ident: ref56
  doi: 10.1109/BigData47090.2019.9006318
– ident: ref11
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref23
  doi: 10.1145/1102219.1102233
– ident: ref10
  doi: 10.1109/TIT.1978.1055892
– ident: ref42
  doi: 10.1109/TDSC.2021.3129512
– ident: ref57
  doi: 10.1109/SP.2012.44
– ident: ref14
  doi: 10.1109/TIT.2011.2173629
SSID ssj0024894
Score 2.3379827
Snippet Traditional approaches to authenticated key establishment include the use of PKI or trusted third parties. While certificate deployment is sub-optimal for...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Index Database
Publisher
StartPage 1
SubjectTerms Authentication
Cryptography
Cybersecurity
Erasure coding
Human error
Information transfer
Internet of Things
key establishment
Low cost
Protocols
RFID tags
security protocols
Sensors
set intersection
Throttling
Transfer functions
Trusted third parties
zeroconf
Title ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications
URI https://ieeexplore.ieee.org/document/9895310
https://www.proquest.com/docview/2859717715
Volume 20
WOSCitedRecordID wos001144489500006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: RIE
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1BS8MwFA5zePDi1ClOp-TgSYymabO03sZ0CBtjsAnDg6VpXkGQVbZO8d_7knZT0Iu30r7S8l6S73vJSz5CLmSiwxCBgSnoGIYIlTGEBc1SnuFICJkxvBSbUKNROJtF4xq52uyFAQBXfAbX9tKt5Zs8XdmpspsojLDJYIK-pVSn3Kv1fa5e6EQPLSNgSJK9agXT49HN9G7Sw0xQiGtfcBVZAZkfGOREVX6NxA5e-o3__dge2a1oJO2Wcd8nNZgfkMZaooFWPbZJnp9gkY8X-QAmt7RL3ew6UHsT8-CMDuCT3iM_dFNR9hsUbQt89kqRzNKhLRNnEwwj0GH-wXr5sqDdH0veh-Sxfz_tPbBKUoGlIpAF842QSSJ0oiV2TIPkIZKKYw7kS4SzRCueitCA0Fkn00EgQUY6SPzQ-CLNRMr9I1Kf53M4JjTloKX00SJBVuKpkGvwPMOxaWoIMmiRy7WT47fy5IzYZRw8im1EYhuRuIpIizStVzeGlUNbpL0OS1z1rWVsj9zDJFR58uTvt07JjhWFLyvB2qReLFZwRrbT9-JluTh3zeYL0f3AQg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED6GCvrib3H-zINPYjRNG9v6NqYy2RyDTRAfLE1zBUFW2TrF_95L1k1BX3wr7ZWWuyTfd8klH8CJSnUUETDwEC8NJ4TKOcGC5pnIaSTE3BgxFZsIu93o8THu1eBsvhcGEV3xGZ7bS7eWb4psYqfKLuIopiZDCfqiVc6qdmt9n6wXOdlDywk40WSvWsP0RHwxuO43KReU8tyXIoythMwPFHKyKr_GYgcwt2v_-7V1WK2IJGtMI78BNRxuwtpMpIFVfXYLnp9wVPRGRRv7V6zB3Pw6MnuTMuGctfGT3RBDdJNR9huMbEt69sqIzrKOLRTnfQoksk7xwZvFuGSNH4ve2_BwezNotnglqsAzGaiS-0aqNJU61Yq6piH6EKtQUBbkKwK0VIcik5FBqfPLXAeBQhXrIPUj48ssl5nwd2BhWAxxF1gmUCvlk0VKvMQLI6HR84ygxqkxyLEOpzMnJ2_TszMSl3OIOLERSWxEkioiddiyXp0bVg6tw8EsLEnVu8aJPXSP0tDQU3t_v3UMy63BfSfp3HXb-7BiJeKndWEHsFCOJngIS9l7-TIeHbkm9AUCaMOL
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ZeroProKeS%3A+A+Secure+Zeroconf+Key+Establishment+Protocol+for+Large-Scale+Low-Cost+Applications&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Shahnewaz+Karim+Sakib&rft.au=Amariucai%2C+George+T&rft.au=Guan%2C+Yong&rft.date=2023-09-01&rft.pub=IEEE+Computer+Society&rft.issn=1545-5971&rft.eissn=1941-0018&rft.volume=20&rft.issue=5&rft.spage=3636&rft_id=info:doi/10.1109%2FTDSC.2022.3207927&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon