Not logged in.
Quick Search - Contribution
Contribution Details
Type | Book Chapter |
Scope | Discipline-based scholarship |
Title | sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices |
Other Titles | Chapter 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices |
Organization Unit | |
Authors |
|
Editors |
|
Item Subtype | Original Work |
Refereed | Yes |
Status | Published in final form |
Language |
|
Booktitle | Cybersecurity in Smart Homes : Architectures, Solutions and Technologies |
ISBN | 9781789450866 |
Place of Publication | Hoboken, New Jersey, U.S.A. |
Publisher | John Wiley & Sons |
Page Range | 245 - 286 |
Date | 2022 |
Abstract Text | Today, a large number of use cases exist for the Internet-of-Things (IoT) and Wireless Sensor Networks (WSN), such as home automation, ambient assisted living, eHealth, and logistics. The IoT also includes constrained (tiny) devices – sensor nodes – limited in memory, computational capacity and power (a few AAA batteries). This chapter illustrates the Internet's history leading to the current connected world, presents insights of security for the IoT, and paves the way toward the security protocol “sTiki”, developed for constrained devices. sTiki is designed in a similar way to TinySAM, which is an application layer encryption protocol using AES-128 for the symmetric encryption. As sTiki will run on constrained devices, special focus in the implementation was on resource usage, especially memory and energy consumption. The chapter also covers the constraints of developing software for sensor networks, the architecture chosen, and the choice of AES. |
Digital Object Identifier | 10.1002/9781119987451.ch7 |
Other Identification Number | merlin-id:23165 |
Export |
BibTeX
EP3 XML (ZORA) |