In the domain of continuum computing, managing security keys efficiently and securely is paramount due to the diverse range of devices involved, from resource-constrained edge devices to powerful cloud servers. This paper introduces an extended version of the Group-Key PHEMAP protocol, initially designed for IoT applications, tailored to the continuum computing environment. The protocol exploits Physical Unclonable Functions (PUFs) for lightweight and secure key generation, maintaining low computational and communication overheads. It supports dynamic group membership, allowing devices to join and leave the group seamlessly without the need for additional cryptographic keys. Performance evaluations are conducted using an advanced network simulator and prototype implementations on devices representative of continuum computing, confirming the protocol feasibility and robustness.
PUF-Based Secure Key Management for Continuum Computing / Barbareschi, Mario; Casola, Valentina; Emmanuele, Antonio; Lombardi, Daniele. - 250:(2025), pp. 390-399. [10.1007/978-3-031-87778-0_38]
PUF-Based Secure Key Management for Continuum Computing
Barbareschi, Mario;Casola, Valentina;Emmanuele, Antonio;Lombardi, Daniele
2025
Abstract
In the domain of continuum computing, managing security keys efficiently and securely is paramount due to the diverse range of devices involved, from resource-constrained edge devices to powerful cloud servers. This paper introduces an extended version of the Group-Key PHEMAP protocol, initially designed for IoT applications, tailored to the continuum computing environment. The protocol exploits Physical Unclonable Functions (PUFs) for lightweight and secure key generation, maintaining low computational and communication overheads. It supports dynamic group membership, allowing devices to join and leave the group seamlessly without the need for additional cryptographic keys. Performance evaluations are conducted using an advanced network simulator and prototype implementations on devices representative of continuum computing, confirming the protocol feasibility and robustness.| File | Dimensione | Formato | |
|---|---|---|---|
|
978-3-031-87778-0_38.pdf
solo utenti autorizzati
Licenza:
Copyright dell'editore
Dimensione
529.94 kB
Formato
Adobe PDF
|
529.94 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


