Loading…

DCapBAC: embedding authorization logic into smart things through ECC optimizations

In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected informatio...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computer mathematics 2016-02, Vol.93 (2), p.345-366
Main Authors: Hernández-Ramos, José L., Jara, Antonio J., Marín, Leandro, Skarmeta Gómez, Antonio F.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293
cites cdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293
container_end_page 366
container_issue 2
container_start_page 345
container_title International journal of computer mathematics
container_volume 93
creator Hernández-Ramos, José L.
Jara, Antonio J.
Marín, Leandro
Skarmeta Gómez, Antonio F.
description In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.
doi_str_mv 10.1080/00207160.2014.915316
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793272674</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1793272674</sourcerecordid><originalsourceid>FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</originalsourceid><addsrcrecordid>eNp90E1LxDAQBuAgCq6r_8BDwYuXrpOPNqkX0foJC4LoOaRtuhtpmzVJkfXXm7J68eBpLs87zLwInWJYYBBwAUCA4xwWBDBbFDijON9DMwykSIHk2T6aTSSdzCE68v4dAETB8xl6uS3V5ua6vEx0X-mmMcMqUWNYW2e-VDB2SDq7MnVihmAT3ysXkrCOyMfh7LhaJ3dlmdhNMP1PwB-jg1Z1Xp_8zDl6u797LR_T5fPDU3m9TGtGRUiFopUulOBVvATnhFU1iJYqjlvCMgKNriuKgTOAomm55lnG2orjSnAaSUHn6Hy3d-Psx6h9kL3xte46NWg7eol5QQknOWeRnv2h73Z0Q7wuqpxxEBkXUbGdqp313ulWbpyJL28lBjkVLX-LllPRcld0jF3tYmZorevVp3VdI4Padta1Tg218ZL-u-Ebd16CwA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1764708578</pqid></control><display><type>article</type><title>DCapBAC: embedding authorization logic into smart things through ECC optimizations</title><source>Taylor and Francis:Jisc Collections:Taylor and Francis Read and Publish Agreement 2024-2025:Science and Technology Collection (Reading list)</source><creator>Hernández-Ramos, José L. ; Jara, Antonio J. ; Marín, Leandro ; Skarmeta Gómez, Antonio F.</creator><creatorcontrib>Hernández-Ramos, José L. ; Jara, Antonio J. ; Marín, Leandro ; Skarmeta Gómez, Antonio F.</creatorcontrib><description>In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.</description><identifier>ISSN: 0020-7160</identifier><identifier>EISSN: 1029-0265</identifier><identifier>DOI: 10.1080/00207160.2014.915316</identifier><language>eng</language><publisher>Abingdon: Taylor &amp; Francis</publisher><subject>Access control ; Computer information security ; Devices ; ECC ; Internet ; Internet of Things ; IP (Internet Protocol) ; Logic ; Mathematical models ; Optimization ; privacy ; security ; shifting primes</subject><ispartof>International journal of computer mathematics, 2016-02, Vol.93 (2), p.345-366</ispartof><rights>2014 Taylor &amp; Francis 2014</rights><rights>2014 Taylor &amp; Francis</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</citedby><cites>FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Hernández-Ramos, José L.</creatorcontrib><creatorcontrib>Jara, Antonio J.</creatorcontrib><creatorcontrib>Marín, Leandro</creatorcontrib><creatorcontrib>Skarmeta Gómez, Antonio F.</creatorcontrib><title>DCapBAC: embedding authorization logic into smart things through ECC optimizations</title><title>International journal of computer mathematics</title><description>In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.</description><subject>Access control</subject><subject>Computer information security</subject><subject>Devices</subject><subject>ECC</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>IP (Internet Protocol)</subject><subject>Logic</subject><subject>Mathematical models</subject><subject>Optimization</subject><subject>privacy</subject><subject>security</subject><subject>shifting primes</subject><issn>0020-7160</issn><issn>1029-0265</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp90E1LxDAQBuAgCq6r_8BDwYuXrpOPNqkX0foJC4LoOaRtuhtpmzVJkfXXm7J68eBpLs87zLwInWJYYBBwAUCA4xwWBDBbFDijON9DMwykSIHk2T6aTSSdzCE68v4dAETB8xl6uS3V5ua6vEx0X-mmMcMqUWNYW2e-VDB2SDq7MnVihmAT3ysXkrCOyMfh7LhaJ3dlmdhNMP1PwB-jg1Z1Xp_8zDl6u797LR_T5fPDU3m9TGtGRUiFopUulOBVvATnhFU1iJYqjlvCMgKNriuKgTOAomm55lnG2orjSnAaSUHn6Hy3d-Psx6h9kL3xte46NWg7eol5QQknOWeRnv2h73Z0Q7wuqpxxEBkXUbGdqp313ulWbpyJL28lBjkVLX-LllPRcld0jF3tYmZorevVp3VdI4Padta1Tg218ZL-u-Ebd16CwA</recordid><startdate>20160201</startdate><enddate>20160201</enddate><creator>Hernández-Ramos, José L.</creator><creator>Jara, Antonio J.</creator><creator>Marín, Leandro</creator><creator>Skarmeta Gómez, Antonio F.</creator><general>Taylor &amp; Francis</general><general>Taylor &amp; Francis Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20160201</creationdate><title>DCapBAC: embedding authorization logic into smart things through ECC optimizations</title><author>Hernández-Ramos, José L. ; Jara, Antonio J. ; Marín, Leandro ; Skarmeta Gómez, Antonio F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Access control</topic><topic>Computer information security</topic><topic>Devices</topic><topic>ECC</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>IP (Internet Protocol)</topic><topic>Logic</topic><topic>Mathematical models</topic><topic>Optimization</topic><topic>privacy</topic><topic>security</topic><topic>shifting primes</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hernández-Ramos, José L.</creatorcontrib><creatorcontrib>Jara, Antonio J.</creatorcontrib><creatorcontrib>Marín, Leandro</creatorcontrib><creatorcontrib>Skarmeta Gómez, Antonio F.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer mathematics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hernández-Ramos, José L.</au><au>Jara, Antonio J.</au><au>Marín, Leandro</au><au>Skarmeta Gómez, Antonio F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DCapBAC: embedding authorization logic into smart things through ECC optimizations</atitle><jtitle>International journal of computer mathematics</jtitle><date>2016-02-01</date><risdate>2016</risdate><volume>93</volume><issue>2</issue><spage>345</spage><epage>366</epage><pages>345-366</pages><issn>0020-7160</issn><eissn>1029-0265</eissn><abstract>In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.</abstract><cop>Abingdon</cop><pub>Taylor &amp; Francis</pub><doi>10.1080/00207160.2014.915316</doi><tpages>22</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0020-7160
ispartof International journal of computer mathematics, 2016-02, Vol.93 (2), p.345-366
issn 0020-7160
1029-0265
language eng
recordid cdi_proquest_miscellaneous_1793272674
source Taylor and Francis:Jisc Collections:Taylor and Francis Read and Publish Agreement 2024-2025:Science and Technology Collection (Reading list)
subjects Access control
Computer information security
Devices
ECC
Internet
Internet of Things
IP (Internet Protocol)
Logic
Mathematical models
Optimization
privacy
security
shifting primes
title DCapBAC: embedding authorization logic into smart things through ECC optimizations
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T16%3A04%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DCapBAC:%20embedding%20authorization%20logic%20into%20smart%20things%20through%20ECC%20optimizations&rft.jtitle=International%20journal%20of%20computer%20mathematics&rft.au=Hern%C3%A1ndez-Ramos,%20Jos%C3%A9%20L.&rft.date=2016-02-01&rft.volume=93&rft.issue=2&rft.spage=345&rft.epage=366&rft.pages=345-366&rft.issn=0020-7160&rft.eissn=1029-0265&rft_id=info:doi/10.1080/00207160.2014.915316&rft_dat=%3Cproquest_cross%3E1793272674%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1764708578&rft_id=info:pmid/&rfr_iscdi=true