Refine
Has Fulltext
- no (1)
Year of publication
- 2019 (1)
Document Type
- Other (1)
Language
- English (1)
Is part of the Bibliography
- yes (1)
Keywords
- IEEE 802.15.4 (1)
- MAC security (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- link layer security (1)
- rekeying (1)
Institute
- Hasso-Plattner-Institut für Digital Engineering GmbH (1) (remove)
While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap.