Abstract
IoT security for resource-constrained devices is largely based on symmetric block ciphers, such as AES. In such resource-constrained contexts, and particularly in the case of large-scale IoT deployments with multiple devices, the installation of encryption keys can pose a significant challenge. This paper presents SHAKE (SHared Acceleration Key Establishment): a convenient means to generate and install secret keys in IoT devices during deployment. Using SHAKE, an IoT deployment technician can generate and install a shared encryption key on two devices by holding them together and shaking them. SHAKE, operating on each of the devices, captures these movements from an on-board accelerometer and generates a secret key based on the shared acceleration profile. We provide a proof-ofconcept implementation of SHAKE for the Contiki-NG operating system and assess its security against mimic attacks, that is the scenario whereby an eavesdropper with a clear line of sight to the deployment technician tries to mimic the random movements to generate the same key. Finally, we assess the energy requirements for generating a 128-bit key with SHAKE and we compare it against state-of-the-art methods for key generation.
Original language | English |
---|---|
Title of host publication | Proceedings of IEEE 6th World Forum on Internet of Things |
Number of pages | 6 |
Publisher | IEEE |
Publication date | 2020 |
Article number | 9221263 |
ISBN (Print) | 978-1-7281-5504-3 |
DOIs | |
Publication status | Published - 2020 |
Event | 6th IEEE World Forum on Internet of Things - Hilton New Orleans Riverside - ONLINE, New Orleans, United States Duration: 2 Jun 2020 → 16 Jun 2020 Conference number: 6 https://wfiot2020.iot.ieee.org |
Conference
Conference | 6th IEEE World Forum on Internet of Things |
---|---|
Number | 6 |
Location | Hilton New Orleans Riverside - ONLINE |
Country/Territory | United States |
City | New Orleans |
Period | 02/06/2020 → 16/06/2020 |
Internet address |
Keywords
- Secret key generation
- IoT security
- IoT deployments
- Resource-constrained devices
- Internet of Things