Research Repository

A scheme for the generation of strong icmetrics based session key pairs for secure embedded system applications

Tahir, R and Hu, H and Gu, D and McDonald-Maier, K and Howells, G (2013) A scheme for the generation of strong icmetrics based session key pairs for secure embedded system applications. In: UNSPECIFIED, ? - ?.

Full text not available from this repository.

Abstract

This paper presents a scheme for the generation of strong session based ICMetrics key pairs for security critical embedded system applications. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. In the proposed scheme a random session ID is assigned by a trusted party to each participating network entity, which remains valid for a communication session. Our work is based on the design of a key derivation function that uses an ICMetrics secret key and a session token assigned by the trusted party to derive strong cryptographic key pairs for each entity. These session tokens also serve the purpose of identification/authentication between the trusted parties and the respective nodes in each network. The main strength of our proposed scheme rests on the randomness feature incorporated via the random session ID's, which makes the generated strong private/public key pair highly resistant against exhaustive search and rainbow table attacks. Our proposed approach makes use of key stretching using random session tokens via SHA-2 and performs multiple iterations of the proposed key derivation function to generate strong high entropy session key pairs of sufficient length. The randomness of the assigned ID's and the session based communication hinders the attacker's ability to launch various sorts of cryptanalytic attacks, thereby making the generated keys very high in entropy. The randomness feature has also been very carefully tuned according to the construction principles of ICMetrics, so that it doesn't affect the original ICMetrics data. The second part of the proposed scheme generates a corresponding public session key by computing the Hermite Normal Form of the high entropy private session key. © 2013 IEEE.

Item Type: Conference or Workshop Item (Paper)
Additional Information: Published proceedings: Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Science and Health > Computer Science and Electronic Engineering, School of
Depositing User: Users 161 not found.
Date Deposited: 06 Nov 2015 11:35
Last Modified: 23 Jan 2019 00:16
URI: http://repository.essex.ac.uk/id/eprint/14757

Actions (login required)

View Item View Item