Skip to main content

Two-way Authentication for IoT
draft-schmitt-ace-twowayauth-for-iot-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
Authors Corinna Schmitt , Burkhard Stiller
Last updated 2014-12-27 (Latest revision 2014-06-25)
Replaces draft-schmitt-two-way-authentication-for-iot
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

In this draft the first key idea for a full two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards is introduced. The solution is twofold providing a two-way authentication for resource-rich hardware (e.g., class 2 devices with ~50 KiB RAM and ~250 KiB ROM [14]) and for devices with less resources (e.g., class 1 devices with ~10 KiB RAM and ~100 KiB ROM [14]). By relying on an established standard, existing implementations, engineering techniques, and security infrastructure can be reused, which enables an easy security uptake. The proposed security scheme for resource-rich devices is, therefore, based on RSA, the most widely used public key cryptography algorithm. It is designed to work over standard communication stacks that offer UDP/ IPv6 networking for Low power Wireless Personal Area Networks (6LoWPANs). RSA is a bulky solution at the moment but shows that it is possible using it on constraint devices for security purposes. An optimization is the usage of elliptic curve cryptography (ECC) as assumed for devices with less resources.

Authors

Corinna Schmitt
Burkhard Stiller

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)