A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: Resource-limited device authentication

Piotr Ksiazak, William Farrelly, Kevin Curran

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by most ubiquitous computing devices; thus, there is a need to apply lightweight cryptography primitives and specificalightweight authentication protocols that meet these demands in any application of security to devices with limited resources. The analysis of the lightweight solutions is divided into lightweight authentication protocols and lightweight encryption algorithms. The authors present a prototype running on the nRF9E5 microcontroller that provides necessary authentication and encryption on resource-limited devices.

Original languageEnglish
Title of host publicationResearch Anthology on Artificial Intelligence Applications in Security
PublisherIGI Global
Pages586-630
Number of pages45
Volume2-4
ISBN (Electronic)9781799877486
ISBN (Print)9781799877059
DOIs
Publication statusPublished - 27 Nov 2020

Fingerprint

Dive into the research topics of 'A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: Resource-limited device authentication'. Together they form a unique fingerprint.

Cite this