A dynamic identity end-to-end authentication key exchange protocol for IoT environments

Chien Lung Hsu, Tzu Hsien Chuang, Yu Han Chen, Tzu Wei Lin, Huang Chia Lu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Wearable devices are the most frequently used personal devices, in ail of wearable devices, the smart phones are the most popular and rapid development. The evolution of wearable devices such as smartphones will accelerate the development of Internet of Things (IoT). Furthermore, user can use the IoT services easily through the smartphone or wearing device. However, if the communication between the wearable device and other devices does not have enough access control and information protect, it may cause some problems, such as the data may be stolen and modified. In this paper, we presented an end-to-end authenticated key exchange agreement for wearable devices in IoT environments. The protocol can satisfy some properties of key exchange agreement and be used with wearable devices in IoT environments.

Original languageEnglish
Title of host publication2017 12th International Conference on Digital Information Management, ICDIM 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages133-138
Number of pages6
ISBN (Electronic)9781538606643
DOIs
StatePublished - 28 06 2017
Externally publishedYes
Event12th International Conference on Digital Information Management, ICDIM 2017 - Fukuoka, Japan
Duration: 12 09 201714 09 2017

Publication series

Name2017 12th International Conference on Digital Information Management, ICDIM 2017
Volume2018-January

Conference

Conference12th International Conference on Digital Information Management, ICDIM 2017
Country/TerritoryJapan
CityFukuoka
Period12/09/1714/09/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • IoT
  • authentication
  • security
  • wearable devices

Fingerprint

Dive into the research topics of 'A dynamic identity end-to-end authentication key exchange protocol for IoT environments'. Together they form a unique fingerprint.

Cite this