Lightweight certificate revocation for low-power IoT with end-to-end security
Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalenc...
Uloženo v:
| Vydáno v: | Journal of information security and applications Ročník 73; s. 103424 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier Ltd
01.03.2023
|
| Témata: | |
| ISSN: | 2214-2126, 2214-2134 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalence of PSK in the IoT is due primarily to a lack of lightweight protocols for accessing PKI services. Principal among these services are digital certificate enrollment and revocation, the former of which is addressed in recent research and is being pushed for standardization in IETF. However, no protocol yet exists for retrieving certificate status information on constrained devices, and revocation is not possible unless such a service is available.
In this work, we start with implementing the Online Certificate Status Protocol (OCSP), the de facto standard for certificate validation on the Web, on state-of-the-art constrained hardware. In doing so, we demonstrate that the resource overhead of this protocol is unacceptable for highly constrained environments. We design, implement and evaluate a lightweight alternative to OCSP, TinyOCSP, which leverages recently standardized IoT protocols, such as CoAP and CBOR. In our experiments, validating eight certificates with TinyOCSP required 41% less energy than validating just one with OCSP on an ARM Cortex-M3 SoC. Moreover, validation transactions encoded with TinyOCSP are at least 73% smaller than the OCSP equivalent.
We design a protocol for compressed certificate revocation lists (CCRL) using Bloom filters which together with TinyOCSP can further reduce validation overhead. We derive a set of equations for computing the optimal filter parameters, and confirm these results through empirical evaluation. |
|---|---|
| AbstractList | Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalence of PSK in the IoT is due primarily to a lack of lightweight protocols for accessing PKI services. Principal among these services are digital certificate enrollment and revocation, the former of which is addressed in recent research and is being pushed for standardization in IETF. However, no protocol yet exists for retrieving certificate status information on constrained devices, and revocation is not possible unless such a service is available. In this work, we start with implementing the Online Certificate Status Protocol (OCSP), the de facto standard for certificate validation on the Web, on state-of-the-art constrained hardware. In doing so, we demonstrate that the resource overhead of this protocol is unacceptable for highly constrained environments. We design, implement and evaluate a lightweight alternative to OCSP, TinyOCSP, which leverages recently standardized IoT protocols, such as CoAP and CBOR. In our experiments, validating eight certificates with TinyOCSP required 41% less energy than validating just one with OCSP on an ARM Cortex-M3 SoC. Moreover, validation transactions encoded with TinyOCSP are at least 73% smaller than the OCSP equivalent. We design a protocol for compressed certificate revocation lists (CCRL) using Bloom filters which together with TinyOCSP can further reduce validation overhead. We derive a set of equations for computing the optimal filter parameters, and confirm these results through empirical evaluation. Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalence of PSK in the IoT is due primarily to a lack of lightweight protocols for accessing PKI services. Principal among these services are digital certificate enrollment and revocation, the former of which is addressed in recent research and is being pushed for standardization in IETF. However, no protocol yet exists for retrieving certificate status information on constrained devices, and revocation is not possible unless such a service is available. In this work, we start with implementing the Online Certificate Status Protocol (OCSP), the de facto standard for certificate validation on the Web, on state-of-the-art constrained hardware. In doing so, we demonstrate that the resource overhead of this protocol is unacceptable for highly constrained environments. We design, implement and evaluate a lightweight alternative to OCSP, TinyOCSP, which leverages recently standardized IoT protocols, such as CoAP and CBOR. In our experiments, validating eight certificates with TinyOCSP required 41% less energy than validating just one with OCSP on an ARM Cortex-M3 SoC. Moreover, validation transactions encoded with TinyOCSP are at least 73% smaller than the OCSP equivalent. We design a protocol for compressed certificate revocation lists (CCRL) using Bloom filters which together with TinyOCSP can further reduce validation overhead. We derive a set of equations for computing the optimal filter parameters, and confirm these results through empirical evaluation. © 2023 The Authors Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalence of PSK in the IoT is due primarily to a lack of lightweight protocols for accessing PKI services. Principal among these services are digital certificate enrollment and revocation, the former of which is addressed in recent research and is being pushed for standardization in IETF. However, no protocol yet exists for retrieving certificate status information on constrained devices, and revocation is not possible unless such a service is available. In this work, we start with implementing the Online Certificate Status Protocol (OCSP), the de facto standard for certificate validation on the Web, on state-of-the-art constrained hardware. In doing so, we demonstrate that the resource overhead of this protocol is unacceptable for highly constrained environments. We design, implement and evaluate a lightweight alternative to OCSP, TinyOCSP, which leverages recently standardized IoT protocols, such as CoAP and CBOR. In our experiments, validating eight certificates with TinyOCSP required 41% less energy than validating just one with OCSP on an ARM Cortex-M3 SoC. Moreover, validation transactions encoded with TinyOCSP are at least 73% smaller than the OCSP equivalent. We design a protocol for compressed certificate revocation lists (CCRL) using Bloom filters which together with TinyOCSP can further reduce validation overhead. We derive a set of equations for computing the optimal filter parameters, and confirm these results through empirical evaluation. Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however, security has predominantly been based on pre-shared keys (PSK), which cannot be revoked and do not provide strong authentication. The prevalence of PSK in the IoT is due primarily to a lack of lightweight protocols for accessing PKI services. Principal among these services are digital certificate enrollment and revocation, the former of which is addressed in recent research and is being pushed for standardization in IETF. However, no protocol yet exists for retrieving certificate status information on constrained devices, and revocation is not possible unless such a service is available. In this work, we start with implementing the Online Certificate Status Protocol (OCSP), the de facto standard for certificate validation on the Web, on state-of-the-art constrained hardware. In doing so, we demonstrate that the resource overhead of this protocol is unacceptable for highly constrained environments. We design, implement and evaluate a lightweight alternative to OCSP, TinyOCSP, which leverages recently standardized IoT protocols, such as CoAP and CBOR. In our experiments, validating eight certificates with TinyOCSP required 41% less energy than validating just one with OCSP on an ARM Cortex-M3 SoC. Moreover, validation transactions encoded with TinyOCSP are at least 73% smaller than the OCSP equivalent. We design a protocol for compressed certificate revocation lists (CCRL) using Bloom filters which together with TinyOCSP can further reduce validation overhead. We derive a set of equations for computing the optimal filter pa |
| ArticleNumber | 103424 |
| Author | Raza, Shahid Furuhed, Martin Höglund, Joel |
| Author_xml | – sequence: 1 givenname: Joel orcidid: 0000-0002-9491-8183 surname: Höglund fullname: Höglund, Joel email: joel.hoglund@ri.se organization: RISE Research Institutes of Sweden, Isafjordsgatan 22, Kista, Stockholm, 16440, Sweden – sequence: 2 givenname: Martin surname: Furuhed fullname: Furuhed, Martin email: martin.furuhed@nexusgroup.com organization: Nexus Group, Telefonv. 26, Stockholm, 12626, Sweden – sequence: 3 givenname: Shahid orcidid: 0000-0001-8192-0893 surname: Raza fullname: Raza, Shahid email: shahid.raze@ri.se organization: RISE Research Institutes of Sweden, Isafjordsgatan 22, Kista, Stockholm, 16440, Sweden |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-64231$$DView record from Swedish Publication Index (Mälardalens högskola) https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-63979$$DView record from Swedish Publication Index https://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-495063$$DView record from Swedish Publication Index (Uppsala universitet) |
| BookMark | eNqNkU9PwzAMxXMACRh8AU69Q0eSptkicUHjrzTEBbhaaepunkYzJRkV356OwYXD4OJnWe9nS35HbK_1LTJ2KvhQcKEvFsMFRTuUXBb9oFBS7bFDKYXKpZD6gJ3EuOCcCylMKYtD9jil2Tx1uKmZw5CoIWcTZgHffd-Qb7PGh2zpu3zlOwzZg3_OOkrzDNs6Tz7vJYvo1oHSxzHbb-wy4sm3DtjL7c3z5D6fPt09TK6muVOlSrnkSmtZCVMbMzZjbSojpTPGldohcqt143Q1sqrCqrFj7fTImqaUta50WRWmGLDz7d7Y4WpdwSrQmw0f4C3BNb1egQ8zWK9BmZLroref_W0PBLowo38uf6vnoJUsRG8fb-0u-BgDNuAofT0uBUtLEBw2ycACNsnAJhnYJtOj8hf6c2sndLmFsH_wO2GA6AhbhzUFdAlqT7vwTwMyrJQ |
| CitedBy_id | crossref_primary_10_1109_JSEN_2024_3430515 crossref_primary_10_1007_s10207_024_00825_z |
| Cites_doi | 10.1109/TDSC.2015.2467385 10.1145/2463183.2463193 10.1109/INFOCOM.2019.8737423 10.1109/49.839932 |
| ContentType | Journal Article |
| Copyright | 2023 The Authors |
| Copyright_xml | – notice: 2023 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION ABGEM ADTPV AOWAS D8T DF7 ZZAVC DF2 |
| DOI | 10.1016/j.jisa.2023.103424 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef SWEPUB Mälardalens högskola full text SwePub SwePub Articles SWEPUB Freely available online SWEPUB Mälardalens högskola SwePub Articles full text SWEPUB Uppsala universitet |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | oai_DiVA_org_uu_495063 oai_DiVA_org_ri_63979 oai_DiVA_org_mdh_64231 10_1016_j_jisa_2023_103424 S2214212623000091 |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 6I. 7-5 8P~ AAEDT AAEDW AAFJI AAFTH AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABMAC ABXDB ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEIPS AEKER AFJKZ AFTJW AFXIZ AGCQF AGHFR AGRNS AGUBO AIALX AIEXJ AIIUN AIKHN AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOMHK AOUOD APXCP AVARZ AXJTR BKOJK BLXMC BNPGV EBS EFJIC EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSH SSO SSV SSZ T5K ~G- AAYXX ACLOT ACVFH ADCNI AEUPX AFPUW AIGII AKBMS AKYEP CITATION EFKBS EFLBG ABGEM ADTPV AOWAS D8T DF7 ZZAVC DF2 |
| ID | FETCH-LOGICAL-c454t-204662b19d9989869b922c99c56cee0a66fc6b7a4bebfa86c67a9f52d6b65b393 |
| ISICitedReferencesCount | 14 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000925935000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2214-2126 2214-2134 |
| IngestDate | Tue Nov 04 16:52:42 EST 2025 Wed Sep 24 03:41:37 EDT 2025 Tue Nov 04 16:25:03 EST 2025 Wed Nov 05 20:35:53 EST 2025 Tue Nov 18 22:35:37 EST 2025 Sun May 18 06:42:43 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | IoT security OCSP X.509 Revocation PKI |
| Language | English |
| License | This is an open access article under the CC BY license. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c454t-204662b19d9989869b922c99c56cee0a66fc6b7a4bebfa86c67a9f52d6b65b393 |
| ORCID | 0000-0002-9491-8183 0000-0001-8192-0893 |
| OpenAccessLink | https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-64231 |
| ParticipantIDs | swepub_primary_oai_DiVA_org_uu_495063 swepub_primary_oai_DiVA_org_ri_63979 swepub_primary_oai_DiVA_org_mdh_64231 crossref_citationtrail_10_1016_j_jisa_2023_103424 crossref_primary_10_1016_j_jisa_2023_103424 elsevier_sciencedirect_doi_10_1016_j_jisa_2023_103424 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-03-01 |
| PublicationDateYYYYMMDD | 2023-03-01 |
| PublicationDate_xml | – month: 03 year: 2023 text: 2023-03-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2023 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Gibson (b23) 2014 Pritikin, Yee, Harkins (b11) 2013 Vasseur (b5) 2010 Larisch, Choffnes, Levin, Maggs, Mislove, Wilson (b14) 2017 Micali S. NOVOMODO: Scalable Certificate Validation and Simplified PKI Management. In: Proceedings of the 1st annual PKI research workshop, Vol. 15. 2002. Stevens, Bursztein, Karpman (b26) 2017 Naor, Nissim (b19) 2000; 18 Liu, Tome, Zhang, Choffnes, Levin, Maggs (b3) 2015 Foundation (b27) 2018 Wright, Lincoln, Millen (b25) 2000 Hummen R, Ziegeldorf JH, Shafagh H, Raza S, Wehrle K. Towards Viable Certificate-based Authentication for the Web of Things. In: ACM workshop on hot topics on wireless network security and privacy, co-located with ACM WiSec 2013. Budapest, Hungary; 2013, p. 0–5. Rabieh, Mahmoud, Akkaya, Tonyali (b13) 2017; 14 Micali (b20) 1996 Bormann, Hoffman (b7) 2013 Selander, Mattsson, Palombini, Seitz (b8) 2018 Kocher (b17) 1998 Jones (b28) 2017 Raya, Jungels, Papadimitratos, Aad, Hubaux (b12) 2006 Wang M, Qian C, Li X, Shi S. Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. In: Proceedings of IEEE INFOCOM. Paris, France; 2019, p. 92–105. Mani, Durairajan, Barford, Sommers (b31) 2018 Bormann, Ersue, Keränen (b16) 2014 Santesson, Myers, Ankney, Malpani, Galperin, Adams (b2) 2013 Li Duan, Yong Li, Lijun Liao (b15) 2018 Selander, Raza, Furuhed, Vucinic (b9) 2019 Goodrich, Tamassia, Schwerin (b18) 2001 Lim, Lakshminarayanan (b22) 2007 Zhang, Choffnes, Levin, Dumitraş, Mislove, Schulman (b30) 2014 Montenegro, Hui, Culler, Kushalnagar (b4) 2007 van der Stok, Kampanakis, Kumar, Richardson, Furuhed, Raza (b10) 2018 Shelby, Hartke, Bormann (b6) 2014 Goel, Gupta (b29) 2010 Zhang (10.1016/j.jisa.2023.103424_b30) 2014 Selander (10.1016/j.jisa.2023.103424_b9) 2019 Bormann (10.1016/j.jisa.2023.103424_b16) 2014 Pritikin (10.1016/j.jisa.2023.103424_b11) 2013 Wright (10.1016/j.jisa.2023.103424_b25) 2000 Micali (10.1016/j.jisa.2023.103424_b20) 1996 van der Stok (10.1016/j.jisa.2023.103424_b10) 2018 Goodrich (10.1016/j.jisa.2023.103424_b18) 2001 Mani (10.1016/j.jisa.2023.103424_b31) 2018 Li Duan (10.1016/j.jisa.2023.103424_b15) 2018 Naor (10.1016/j.jisa.2023.103424_b19) 2000; 18 Larisch (10.1016/j.jisa.2023.103424_b14) 2017 Selander (10.1016/j.jisa.2023.103424_b8) 2018 Goel (10.1016/j.jisa.2023.103424_b29) 2010 Foundation (10.1016/j.jisa.2023.103424_b27) 2018 Liu (10.1016/j.jisa.2023.103424_b3) 2015 Vasseur (10.1016/j.jisa.2023.103424_b5) 2010 Shelby (10.1016/j.jisa.2023.103424_b6) 2014 Bormann (10.1016/j.jisa.2023.103424_b7) 2013 Jones (10.1016/j.jisa.2023.103424_b28) 2017 10.1016/j.jisa.2023.103424_b24 10.1016/j.jisa.2023.103424_b1 Stevens (10.1016/j.jisa.2023.103424_b26) 2017 10.1016/j.jisa.2023.103424_b21 Raya (10.1016/j.jisa.2023.103424_b12) 2006 Kocher (10.1016/j.jisa.2023.103424_b17) 1998 Santesson (10.1016/j.jisa.2023.103424_b2) 2013 Gibson (10.1016/j.jisa.2023.103424_b23) 2014 Montenegro (10.1016/j.jisa.2023.103424_b4) 2007 Rabieh (10.1016/j.jisa.2023.103424_b13) 2017; 14 Lim (10.1016/j.jisa.2023.103424_b22) 2007 |
| References_xml | – year: 2013 ident: b7 article-title: Concise binary object representation (CBOR) – start-page: 68 year: 2001 end-page: 82 ident: b18 article-title: Implementation of an authenticated dictionary with skip lists and commutative hashing publication-title: Proceedings DARPA information survivability conference and exposition II, Vol. 2 – year: 2018 ident: b10 article-title: EST over secure CoAP (EST-coaps) publication-title: Internet-draft draft-ietf-ace-coap-est-06 – volume: 18 start-page: 561 year: 2000 end-page: 570 ident: b19 article-title: Certificate revocation and certificate update publication-title: IEEE J Sel Areas Commun – start-page: 143 year: 2010 end-page: 154 ident: b29 article-title: Small subset queries and bloom filters using ternary associative memories, with applications publication-title: Proceedings of the ACM SIGMETRICS international conference on measurement and modeling of computer systems – start-page: 183 year: 2015 end-page: 196 ident: b3 article-title: An end-to-end measurement of certificate revocation in the web’s PKI publication-title: Proceedings of the 2015 internet measurement conference – start-page: 539 year: 2017 end-page: 556 ident: b14 article-title: Crlite: A scalable system for pushing all TLS revocations to all browsers publication-title: 2017 IEEE symposium on security and privacy – start-page: 19 year: 2000 end-page: 24 ident: b25 article-title: Efficient fault-tolerant certificate revocation publication-title: Proceedings of the 7th ACM conference on computer and communications security – start-page: 7:1 year: 2018 end-page: 7:8 ident: b15 article-title: Flexible certificate revocation list for efficient authentication in IoT publication-title: Proceedings of the 8th international conference on the internet of things – year: 2017 ident: b26 article-title: Announcing the first SHA1 collision – volume: 14 start-page: 420 year: 2017 end-page: 432 ident: b13 article-title: Scalable certificate revocation schemes for smart grid AMI networks using bloom filters publication-title: IEEE Trans Dependable Secure Comput – year: 2018 ident: b8 article-title: Object security for constrained restful environments (OSCORE) publication-title: Internet-draft draft-ietf-core-object-security-15 – reference: Micali S. NOVOMODO: Scalable Certificate Validation and Simplified PKI Management. In: Proceedings of the 1st annual PKI research workshop, Vol. 15. 2002. – year: 2006 ident: b12 article-title: Certificate revocation in vehicular networks publication-title: Laboratory for computer communications and applications – reference: Wang M, Qian C, Li X, Shi S. Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. In: Proceedings of IEEE INFOCOM. Paris, France; 2019, p. 92–105. – year: 2017 ident: b28 article-title: The end of SHA-1 on the public web – year: 2014 ident: b23 article-title: An evaluation of the effectiveness of chrome’s CRLSets – year: 2010 ident: b5 article-title: Interconnecting smart objects with IP: the next internet – year: 2014 ident: b16 article-title: Terminology for constrained-node networks – year: 2013 ident: b11 article-title: Enrollment over secure transport – start-page: 172 year: 1998 end-page: 177 ident: b17 article-title: On certificate revocation and validation publication-title: Proceedings of the second international conference on financial cryptography – start-page: 182 year: 2007 end-page: 187 ident: b22 article-title: On the performance of certificate validation schemes based on pre-computed responses publication-title: IEEE GLOBECOM 2007 - IEEE global telecommunications conference – year: 2018 ident: b31 article-title: A system for clock synchronization in an internet of things – reference: Hummen R, Ziegeldorf JH, Shafagh H, Raza S, Wehrle K. Towards Viable Certificate-based Authentication for the Web of Things. In: ACM workshop on hot topics on wireless network security and privacy, co-located with ACM WiSec 2013. Budapest, Hungary; 2013, p. 0–5. – year: 2013 ident: b2 article-title: X.509 internet public key infrastructure online certificate status protocol - OCSP – year: 1996 ident: b20 article-title: Efficient certificate revocation – start-page: 489 year: 2014 end-page: 502 ident: b30 article-title: Analysis of SSL certificate reissues and revocations in the wake of heartbleed publication-title: Proceedings of the 2014 conference on internet measurement conference – year: 2019 ident: b9 article-title: Protecting EST payloads with OSCORE publication-title: Internet-draft draft-selander-ace-coap-est-oscore-02 – year: 2014 ident: b6 article-title: The constrained application protocol (CoAP) – year: 2007 ident: b4 article-title: Transmission of IPv6 packets over IEEE 802.15.4 networks – year: 2018 ident: b27 article-title: OSCP manpage – year: 2007 ident: 10.1016/j.jisa.2023.103424_b4 – year: 2019 ident: 10.1016/j.jisa.2023.103424_b9 article-title: Protecting EST payloads with OSCORE – year: 2014 ident: 10.1016/j.jisa.2023.103424_b23 – year: 2018 ident: 10.1016/j.jisa.2023.103424_b10 article-title: EST over secure CoAP (EST-coaps) – year: 2017 ident: 10.1016/j.jisa.2023.103424_b26 – year: 2013 ident: 10.1016/j.jisa.2023.103424_b2 – start-page: 19 year: 2000 ident: 10.1016/j.jisa.2023.103424_b25 article-title: Efficient fault-tolerant certificate revocation – year: 2006 ident: 10.1016/j.jisa.2023.103424_b12 article-title: Certificate revocation in vehicular networks – start-page: 539 year: 2017 ident: 10.1016/j.jisa.2023.103424_b14 article-title: Crlite: A scalable system for pushing all TLS revocations to all browsers – year: 2013 ident: 10.1016/j.jisa.2023.103424_b11 – start-page: 172 year: 1998 ident: 10.1016/j.jisa.2023.103424_b17 article-title: On certificate revocation and validation – volume: 14 start-page: 420 issue: 4 year: 2017 ident: 10.1016/j.jisa.2023.103424_b13 article-title: Scalable certificate revocation schemes for smart grid AMI networks using bloom filters publication-title: IEEE Trans Dependable Secure Comput doi: 10.1109/TDSC.2015.2467385 – year: 2018 ident: 10.1016/j.jisa.2023.103424_b27 – year: 2014 ident: 10.1016/j.jisa.2023.103424_b6 – ident: 10.1016/j.jisa.2023.103424_b21 – ident: 10.1016/j.jisa.2023.103424_b1 doi: 10.1145/2463183.2463193 – ident: 10.1016/j.jisa.2023.103424_b24 doi: 10.1109/INFOCOM.2019.8737423 – year: 2013 ident: 10.1016/j.jisa.2023.103424_b7 – start-page: 68 year: 2001 ident: 10.1016/j.jisa.2023.103424_b18 article-title: Implementation of an authenticated dictionary with skip lists and commutative hashing – year: 1996 ident: 10.1016/j.jisa.2023.103424_b20 – year: 2017 ident: 10.1016/j.jisa.2023.103424_b28 – start-page: 489 year: 2014 ident: 10.1016/j.jisa.2023.103424_b30 article-title: Analysis of SSL certificate reissues and revocations in the wake of heartbleed – start-page: 182 year: 2007 ident: 10.1016/j.jisa.2023.103424_b22 article-title: On the performance of certificate validation schemes based on pre-computed responses – year: 2018 ident: 10.1016/j.jisa.2023.103424_b31 – year: 2014 ident: 10.1016/j.jisa.2023.103424_b16 – start-page: 7:1 year: 2018 ident: 10.1016/j.jisa.2023.103424_b15 article-title: Flexible certificate revocation list for efficient authentication in IoT – year: 2018 ident: 10.1016/j.jisa.2023.103424_b8 article-title: Object security for constrained restful environments (OSCORE) – start-page: 143 year: 2010 ident: 10.1016/j.jisa.2023.103424_b29 article-title: Small subset queries and bloom filters using ternary associative memories, with applications – start-page: 183 year: 2015 ident: 10.1016/j.jisa.2023.103424_b3 article-title: An end-to-end measurement of certificate revocation in the web’s PKI – year: 2010 ident: 10.1016/j.jisa.2023.103424_b5 – volume: 18 start-page: 561 issue: 4 year: 2000 ident: 10.1016/j.jisa.2023.103424_b19 article-title: Certificate revocation and certificate update publication-title: IEEE J Sel Areas Commun doi: 10.1109/49.839932 |
| SSID | ssj0001219523 ssib023362450 |
| Score | 2.3486474 |
| Snippet | Public key infrastructure (PKI) provides the basis of authentication and access control in most networked systems. In the Internet of Things (IoT), however,... |
| SourceID | swepub crossref elsevier |
| SourceType | Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 103424 |
| SubjectTerms | Authentication Certificate revocation Computer Science with specialization in Computer Communication Datavetenskap med inriktning mot datorkommunikation End-to-end security Internet of thing security Internet of things IoT security Low Power Network security Networked control systems Networked systems OCSP Online certificate status protocol PKI Public key cryptography Public key infrastructure Revocation Strong authentication X.509 |
| Title | Lightweight certificate revocation for low-power IoT with end-to-end security |
| URI | https://dx.doi.org/10.1016/j.jisa.2023.103424 https://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-64231 https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-63979 https://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-495063 |
| Volume | 73 |
| WOSCitedRecordID | wos000925935000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 2214-2126 databaseCode: AIEXJ dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0001219523 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLeg48CFb7SOD_kwTpUn7NhOfCywiU1jQqJMvVmOk6ytSlJlzTbx12PHzgcTLezAJaoi5zXJ7-eX5_ee3wNgP6AqiDmLkY54hKgxSFFEkgQlqcYaZ4yxOpvw_DQ8O4umU_HVpw5d1u0EwjyPbm7E6r9Cbc4ZsO3W2TvA3Qo1J8xvA7o5GtjN8Z-AP7XL7eva4znSNms6q7e52U0qhe5SC5fFNVrZFmmj42Li3LFpnqB1gVLrSvdt7TbYrr7cai2sGerKvvbi4S1jbDD-A79YVs6JfVKkbVrHUVVWM-dvdQUNurjTz9qs_TZTM590730TJOiSs5wKIwRTZD6OvK9vw6CnMLEtQUj_qMudW2FxsLBRfSv9oBv8e-HsWx-0Ns2wyWBbSCtDWhnSybgPdkjIRDQAO-Pjw-lJzy2HBaubArb37rdauazA2zez0Zzp152tbZXJE_DIAwXHjhxPwb00fwYeNw08oNfnz8GXHldgjyuw4wo0QMOWK9BwBVquwI4rsCHAC_D96HDy8TPy_TWQpoyuzayhnJMYi0TYLqJcxIIQLYRm3JhO7xXnmeZxqGicxpmKuOahEhkjCbezOxDBSzDIizzdBdAstONUqSwx1iENgkyFmcCaxjgROlIZGQLcvCapffF52wNlKTdjNASj9pqVK72ydTRr3r70xqMzCqXh09br3jmo2v-wBdc_zc_Hsigv5I9kJs0SPcBDsL9tXDmXdYj8L-KqSlLBzLJg704P9wo87KbXazBYl1X6BjzQV-v5ZfnWc_gXunW6qA |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Lightweight+certificate+revocation+for+low-power+IoT+with+end-to-end+security&rft.jtitle=Journal+of+information+security+and+applications&rft.au=H%C3%B6glund%2C+Joel&rft.au=Furuhed%2C+Martin&rft.au=Raza%2C+Shahid&rft.date=2023-03-01&rft.issn=2214-2126&rft.volume=73&rft.spage=103424&rft_id=info:doi/10.1016%2Fj.jisa.2023.103424&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2023_103424 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |