Loading…
DCapBAC: embedding authorization logic into smart things through ECC optimizations
In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected informatio...
Saved in:
Published in: | International journal of computer mathematics 2016-02, Vol.93 (2), p.345-366 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293 |
---|---|
cites | cdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293 |
container_end_page | 366 |
container_issue | 2 |
container_start_page | 345 |
container_title | International journal of computer mathematics |
container_volume | 93 |
creator | Hernández-Ramos, José L. Jara, Antonio J. Marín, Leandro Skarmeta Gómez, Antonio F. |
description | In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios. |
doi_str_mv | 10.1080/00207160.2014.915316 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793272674</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1793272674</sourcerecordid><originalsourceid>FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</originalsourceid><addsrcrecordid>eNp90E1LxDAQBuAgCq6r_8BDwYuXrpOPNqkX0foJC4LoOaRtuhtpmzVJkfXXm7J68eBpLs87zLwInWJYYBBwAUCA4xwWBDBbFDijON9DMwykSIHk2T6aTSSdzCE68v4dAETB8xl6uS3V5ua6vEx0X-mmMcMqUWNYW2e-VDB2SDq7MnVihmAT3ysXkrCOyMfh7LhaJ3dlmdhNMP1PwB-jg1Z1Xp_8zDl6u797LR_T5fPDU3m9TGtGRUiFopUulOBVvATnhFU1iJYqjlvCMgKNriuKgTOAomm55lnG2orjSnAaSUHn6Hy3d-Psx6h9kL3xte46NWg7eol5QQknOWeRnv2h73Z0Q7wuqpxxEBkXUbGdqp313ulWbpyJL28lBjkVLX-LllPRcld0jF3tYmZorevVp3VdI4Padta1Tg218ZL-u-Ebd16CwA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1764708578</pqid></control><display><type>article</type><title>DCapBAC: embedding authorization logic into smart things through ECC optimizations</title><source>Taylor and Francis:Jisc Collections:Taylor and Francis Read and Publish Agreement 2024-2025:Science and Technology Collection (Reading list)</source><creator>Hernández-Ramos, José L. ; Jara, Antonio J. ; Marín, Leandro ; Skarmeta Gómez, Antonio F.</creator><creatorcontrib>Hernández-Ramos, José L. ; Jara, Antonio J. ; Marín, Leandro ; Skarmeta Gómez, Antonio F.</creatorcontrib><description>In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.</description><identifier>ISSN: 0020-7160</identifier><identifier>EISSN: 1029-0265</identifier><identifier>DOI: 10.1080/00207160.2014.915316</identifier><language>eng</language><publisher>Abingdon: Taylor & Francis</publisher><subject>Access control ; Computer information security ; Devices ; ECC ; Internet ; Internet of Things ; IP (Internet Protocol) ; Logic ; Mathematical models ; Optimization ; privacy ; security ; shifting primes</subject><ispartof>International journal of computer mathematics, 2016-02, Vol.93 (2), p.345-366</ispartof><rights>2014 Taylor & Francis 2014</rights><rights>2014 Taylor & Francis</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</citedby><cites>FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Hernández-Ramos, José L.</creatorcontrib><creatorcontrib>Jara, Antonio J.</creatorcontrib><creatorcontrib>Marín, Leandro</creatorcontrib><creatorcontrib>Skarmeta Gómez, Antonio F.</creatorcontrib><title>DCapBAC: embedding authorization logic into smart things through ECC optimizations</title><title>International journal of computer mathematics</title><description>In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.</description><subject>Access control</subject><subject>Computer information security</subject><subject>Devices</subject><subject>ECC</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>IP (Internet Protocol)</subject><subject>Logic</subject><subject>Mathematical models</subject><subject>Optimization</subject><subject>privacy</subject><subject>security</subject><subject>shifting primes</subject><issn>0020-7160</issn><issn>1029-0265</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp90E1LxDAQBuAgCq6r_8BDwYuXrpOPNqkX0foJC4LoOaRtuhtpmzVJkfXXm7J68eBpLs87zLwInWJYYBBwAUCA4xwWBDBbFDijON9DMwykSIHk2T6aTSSdzCE68v4dAETB8xl6uS3V5ua6vEx0X-mmMcMqUWNYW2e-VDB2SDq7MnVihmAT3ysXkrCOyMfh7LhaJ3dlmdhNMP1PwB-jg1Z1Xp_8zDl6u797LR_T5fPDU3m9TGtGRUiFopUulOBVvATnhFU1iJYqjlvCMgKNriuKgTOAomm55lnG2orjSnAaSUHn6Hy3d-Psx6h9kL3xte46NWg7eol5QQknOWeRnv2h73Z0Q7wuqpxxEBkXUbGdqp313ulWbpyJL28lBjkVLX-LllPRcld0jF3tYmZorevVp3VdI4Padta1Tg218ZL-u-Ebd16CwA</recordid><startdate>20160201</startdate><enddate>20160201</enddate><creator>Hernández-Ramos, José L.</creator><creator>Jara, Antonio J.</creator><creator>Marín, Leandro</creator><creator>Skarmeta Gómez, Antonio F.</creator><general>Taylor & Francis</general><general>Taylor & Francis Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20160201</creationdate><title>DCapBAC: embedding authorization logic into smart things through ECC optimizations</title><author>Hernández-Ramos, José L. ; Jara, Antonio J. ; Marín, Leandro ; Skarmeta Gómez, Antonio F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Access control</topic><topic>Computer information security</topic><topic>Devices</topic><topic>ECC</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>IP (Internet Protocol)</topic><topic>Logic</topic><topic>Mathematical models</topic><topic>Optimization</topic><topic>privacy</topic><topic>security</topic><topic>shifting primes</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hernández-Ramos, José L.</creatorcontrib><creatorcontrib>Jara, Antonio J.</creatorcontrib><creatorcontrib>Marín, Leandro</creatorcontrib><creatorcontrib>Skarmeta Gómez, Antonio F.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer mathematics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hernández-Ramos, José L.</au><au>Jara, Antonio J.</au><au>Marín, Leandro</au><au>Skarmeta Gómez, Antonio F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DCapBAC: embedding authorization logic into smart things through ECC optimizations</atitle><jtitle>International journal of computer mathematics</jtitle><date>2016-02-01</date><risdate>2016</risdate><volume>93</volume><issue>2</issue><spage>345</spage><epage>366</epage><pages>345-366</pages><issn>0020-7160</issn><eissn>1029-0265</eissn><abstract>In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This extension of technology to common environments demands greater security restrictions, since any unexpected information leakage or illegitimate access to data could present a high impact in our lives. Additionally, the application of standard security and access control mechanisms to these emerging ecosystems has to face new challenges due to the inherent nature and constraints of devices and networks which make up this novel landscape. While these challenges have been usually addressed by centralized approaches, in this work we present a set of Elliptic Curve Cryptography optimizations for point and field arithmetic which are used in the design and implementation of a security and capability-based access control mechanism (DCapBAC) on smart objects. Our integral solution is based on a lightweight and flexible design that allows this functionality is embedded on resource-constrained devices, providing the advantages of a distributed security approach for Internet of Things (IoT) in terms of scalability, interoperability and end-to-end security. Additionally, our scheme has been successfully validated by using AVISPA tool and implemented on a real scenario over the Jennic/NXP JN5148 chipset based on a 32-bit RISC CPU. The results demonstrate the feasibility of our work and show DCapBAC as a promising approach to be considered as security solution for IoT scenarios.</abstract><cop>Abingdon</cop><pub>Taylor & Francis</pub><doi>10.1080/00207160.2014.915316</doi><tpages>22</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0020-7160 |
ispartof | International journal of computer mathematics, 2016-02, Vol.93 (2), p.345-366 |
issn | 0020-7160 1029-0265 |
language | eng |
recordid | cdi_proquest_miscellaneous_1793272674 |
source | Taylor and Francis:Jisc Collections:Taylor and Francis Read and Publish Agreement 2024-2025:Science and Technology Collection (Reading list) |
subjects | Access control Computer information security Devices ECC Internet Internet of Things IP (Internet Protocol) Logic Mathematical models Optimization privacy security shifting primes |
title | DCapBAC: embedding authorization logic into smart things through ECC optimizations |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T16%3A04%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DCapBAC:%20embedding%20authorization%20logic%20into%20smart%20things%20through%20ECC%20optimizations&rft.jtitle=International%20journal%20of%20computer%20mathematics&rft.au=Hern%C3%A1ndez-Ramos,%20Jos%C3%A9%20L.&rft.date=2016-02-01&rft.volume=93&rft.issue=2&rft.spage=345&rft.epage=366&rft.pages=345-366&rft.issn=0020-7160&rft.eissn=1029-0265&rft_id=info:doi/10.1080/00207160.2014.915316&rft_dat=%3Cproquest_cross%3E1793272674%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c438t-8a3be9a87b8971624bc08f3a71f24520decb31074009df7e7554fb71b8731f293%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1764708578&rft_id=info:pmid/&rfr_iscdi=true |