Publication Details
Overview
 
 
 

Chapter in Book/ Report/ Conference proceeding

Abstract 

The wireless deployment or configuration of devices or systems without any manual intervention is essential to increase the efficiency as it allows to automate the setup process entirely, requiring minimal or no human involvement. This concept is also called zero-touch deployment and requires a proper and efficient key management strategy when constrained devices at large scale are involved. In this paper we propose a highly efficient mutual authentication and key agreement scheme, enabling devices without pre-shared key material to get access to the system network. The proposed protocol satisfies perfect forward secrecy and resistance against ephemeral session key leakage. We also discuss its feasibility for Time Slotted Channel Hopping (TSCH) based sensor networks.

Reference 
 
 
DOI  scopus