Trajectory-based Authenticated Key Establishment for Dynamic Internet of Things

Mengya Li, Ning Zhang

Research output: Contribution to journalArticlepeer-review

31 Downloads (Pure)


In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these entities. They may not have established secrets prior to the key establishment, and the key establishment has to be finished in a limited time. Existing solutions either rely on the entities having prior secrets, or have a latency that may not meet the time limit. This paper proposes a new key establishment method that does not use prior secret or trust and has high efficiency. The method, called Trajectory-based Authenticated Key Establishment (TAKE), establishes a shared secret and uses it to derive a pair of symmetric keys, using only real-time trajectory data of a moving entity. The shared secret can also be used for authentication or to establish asymmetric keys. Theoretical analysis and experimental evaluation demonstrate that TAKE can efficiently establish keys with multiple security levels and resist attacks on authentication, confidentiality and integrity. Experiment results show TAKE can distinguish authorised entities and establish keys for them with high reliability, with a true positive rate of 99% and a false positive rate of 0. One key establishment finishes within 200 ms, which is significantly faster than other solutions without using prior secrets.
Original languageEnglish
Article number111419 - 111448
JournalIEEE Access
Publication statusPublished - 19 Oct 2022


Dive into the research topics of 'Trajectory-based Authenticated Key Establishment for Dynamic Internet of Things'. Together they form a unique fingerprint.

Cite this