Optimal Key Management for Secure D2D Communication in IoT Environment

被引:0
作者
Kumar, Lalit [1 ]
Kumar, Pradeep [1 ]
机构
[1] JC Bose Univ Sci & Technol, Dept Elect Engn, YMCA, Faridabad, Haryana, India
关键词
Internet of Things; optimal path; mobility; Improved ECC; CMU-Coptimization; INTERNET; ATTACK; TRUST; AUTHENTICATION; LIGHTWEIGHT; FRAMEWORK; RPL;
D O I
10.32908/ahswn.v58.9943
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel technology named Internet of Things aims to connect all common objects. How to secure D2D communication is one of the main problems preventing its development. Particularly, Key Management (KM) is among the most challenging security issues. The difficulty is caused by the lack of resources in the vast majority of IoT devices. Although several methods were created, most of them do not account for the dynamic nature of IoT. As the network evolves, other systems depend on a centralized entity to distribute new keys. Here, we have developed a secured model that has four working phases, which were described below. (1) Network Generation: In the first phase, the network is generated. (2) D2D Communication: In this second phase, for Device to Device (D2D) communication, it is important to select which devices to be connected. Thereby, there is a need for an essential path among them. This will be done optimally (optimal path identification), by the Chaotic Map Upgraded COOT optimization (CMU-CO). Here, the optimal path is chosen based on distance, mobility and delay. Encryption between nodes (Devices): Improved Elliptic Curve Cryptography (ECC) is used in this phase for secure communication, thereby, the data transmission become more secure. In this approach, the key generation takes place optimally by the new CMUCO. Decryption: In this final phase, the original data are retrieved by decrypting it.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 37 条
[1]   Safety, Security and Privacy in Machine Learning Based Internet of Things [J].
Abbas, Ghulam ;
Mehmood, Amjad ;
Carsten, Maple ;
Epiphaniou, Gregory ;
Lloret, Jaime .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
[2]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[3]   An Intelligence-Based Recurrent Learning Scheme for Optimal Channel Allocation and Selection in Device-to-Device Communications [J].
Al-Makhadmeh, Zafer ;
Tolba, Amr .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2020, 39 (02) :997-1018
[4]   ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment [J].
Alzahrani, Bander A. ;
Chaudhry, Shehzad Ashraf ;
Barnawi, Ahmed ;
Xiao, Wenjing ;
Chen, Min ;
Al-Barakati, Abdullah .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (11) :5123-5135
[5]   HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things [J].
Awan, Kamran Ahmad ;
Din, Ikram Ud ;
Zareei, Mardi ;
Talha, Muhammad ;
Guizani, Mohsen ;
Jadoon, Sultan Ullah .
IEEE ACCESS, 2019, 7 :52191-52201
[6]   Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model [J].
Balaji, Subramanian ;
Julie, Eanoch Golden ;
Robinson, Yesudhas Harold ;
Kumar, Raghvendra ;
Pham Huy Thong ;
Le Hoang Song .
COMPUTER STANDARDS & INTERFACES, 2019, 66
[7]   Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT) [J].
Bello, Oladayo ;
Zeadally, Sherali ;
Badra, Mohamad .
AD HOC NETWORKS, 2017, 57 :52-62
[8]   A secure and robust scheme for sharing confidential information in IoT systems [J].
Bu, Lake ;
Isakov, Mihailo ;
Kinsy, Michel A. .
AD HOC NETWORKS, 2019, 92
[9]   Attestation-enabled secure and scalable routing protocol for IoT networks [J].
Conti, Mauro ;
Kaliyar, Pallavi ;
Rabbani, Md Masoom ;
Ranise, Silvio .
AD HOC NETWORKS, 2020, 98
[10]   On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure [J].
Das, Ashok Kumar ;
Bera, Basudeb ;
Wazid, Mohammad ;
Jamal, Sajjad Shaukat ;
Park, Youngho .
IEEE ACCESS, 2021, 9 :71856-71867