Not logged in.

Contribution Details

Type Book Chapter
Scope Discipline-based scholarship
Title sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices
Other Titles Chapter 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices
Organization Unit
Authors
  • Corinna Schmitt
  • Severin Siffert
  • Burkhard Stiller
Editors
  • Rida Khatoun
Item Subtype Original Work
Refereed Yes
Status Published in final form
Language
  • English
Booktitle Cybersecurity in Smart Homes : Architectures, Solutions and Technologies
ISBN 9781789450866
Place of Publication Hoboken, New Jersey, U.S.A.
Publisher John Wiley & Sons
Page Range 245 - 286
Date 2022
Abstract Text Today, a large number of use cases exist for the Internet-of-Things (IoT) and Wireless Sensor Networks (WSN), such as home automation, ambient assisted living, eHealth, and logistics. The IoT also includes constrained (tiny) devices – sensor nodes – limited in memory, computational capacity and power (a few AAA batteries). This chapter illustrates the Internet's history leading to the current connected world, presents insights of security for the IoT, and paves the way toward the security protocol “sTiki”, developed for constrained devices. sTiki is designed in a similar way to TinySAM, which is an application layer encryption protocol using AES-128 for the symmetric encryption. As sTiki will run on constrained devices, special focus in the implementation was on resource usage, especially memory and energy consumption. The chapter also covers the constraints of developing software for sensor networks, the architecture chosen, and the choice of AES.
Digital Object Identifier 10.1002/9781119987451.ch7
Other Identification Number merlin-id:23165
Export BibTeX
EP3 XML (ZORA)