Detail publikačního výsledku

Efficient Authentication and Key Agreement for Machine-to-Machine Communication on STM32 Microcontrollers

DZURENDA, P.; ČÍKA, P.; ŠTŮSEK, M.

Originální název

Efficient Authentication and Key Agreement for Machine-to-Machine Communication on STM32 Microcontrollers

Anglický název

Efficient Authentication and Key Agreement for Machine-to-Machine Communication on STM32 Microcontrollers

Druh

Stať ve sborníku v databázi WoS či Scopus

Originální abstrakt

In Industry 4.0, Machine-to-Machine (M2M) communication allows devices, such as sensors, to exchange data autonomously. However, current M2M protocols often depend on costly asymmetric cryptography, which is not suitable for constrained Internet of Things (IoT) devices. Hence, lightweight security is crucial to unlock the full potential of M2M in this environment. Therefore, this work focuses on the design and implementation of AKA protocols utilizing standardized algorithms such as the Advanced Encryption Standard (AES), the Elliptic Curve Digital Signature Algorithm (ECDSA), the Elliptic Curve Diffie-Hellman (ECDH) and Schnorr. The main goal is to use cryptographic processors on STM32 microcontrollers with which IoT sensors are equipped. Our security and performance evaluations confirm their practical applicability.

Anglický abstrakt

In Industry 4.0, Machine-to-Machine (M2M) communication allows devices, such as sensors, to exchange data autonomously. However, current M2M protocols often depend on costly asymmetric cryptography, which is not suitable for constrained Internet of Things (IoT) devices. Hence, lightweight security is crucial to unlock the full potential of M2M in this environment. Therefore, this work focuses on the design and implementation of AKA protocols utilizing standardized algorithms such as the Advanced Encryption Standard (AES), the Elliptic Curve Digital Signature Algorithm (ECDSA), the Elliptic Curve Diffie-Hellman (ECDH) and Schnorr. The main goal is to use cryptographic processors on STM32 microcontrollers with which IoT sensors are equipped. Our security and performance evaluations confirm their practical applicability.

Klíčová slova

Applied Cryptography; Security; Industry 4.0; Machine-to-Machine Communication; Lightweight Cryptography; Constrained Devices; Authentication; Key Agreement

Klíčová slova v angličtině

Applied Cryptography; Security; Industry 4.0; Machine-to-Machine Communication; Lightweight Cryptography; Constrained Devices; Authentication; Key Agreement

Autoři

DZURENDA, P.; ČÍKA, P.; ŠTŮSEK, M.

Vydáno

04.11.2025

ISBN

979-8-3315-7675-2

Kniha

2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)

Periodikum

International Congress on Ultra Modern Telecommunications and Workshops

Číslo

11

Stát

Spojené státy americké

Strany od

62

Strany do

68

Strany počet

7

URL

BibTex

@inproceedings{BUT199856,
  author="Petr {Dzurenda} and Petr {Číka} and Martin {Štůsek}",
  title="Efficient Authentication and Key Agreement for Machine-to-Machine Communication on STM32 Microcontrollers",
  booktitle="2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)",
  year="2025",
  journal="International Congress on Ultra Modern Telecommunications and Workshops",
  number="11",
  pages="62--68",
  doi="10.1109/ICUMT67815.2025",
  isbn="979-8-3315-7675-2",
  url="https://ieeexplore.ieee.org/document/11268576"
}