IEEE Access (Jan 2022)

Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things

  • Mengya Li,
  • Ning Zhang

DOI
https://doi.org/10.1109/ACCESS.2022.3215688
Journal volume & issue
Vol. 10
pp. 111419 – 111448

Abstract

Read online

In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these entities. They may not have established secrets prior to the key establishment, and the key establishment has to be finished in a limited time. Existing solutions either rely on the entities having prior secrets, or have a latency that may not meet the time limit. This paper proposes a new key establishment method that does not use prior secret or trust and has high efficiency. The method, called Trajectory-based Authenticated Key Establishment (TAKE), establishes a shared secret and uses it to derive a pair of symmetric keys, using only real-time trajectory data of a moving entity. The shared secret can also be used for authentication or to establish asymmetric keys. Theoretical analysis and experimental evaluation demonstrate that TAKE can efficiently establish keys with multiple security levels and resist attacks on authentication, confidentiality and integrity. Experiment results show TAKE can distinguish authorised entities and establish keys for them with high reliability, with a true positive rate of 99% and a false positive rate of 0. One key establishment finishes within 200 ms, which is significantly faster than other solutions without using prior secrets.

Keywords