Matrix-based key management scheme for IoT networks

被引:18
作者
Nafi, Mohammed [1 ]
Bouzefrane, Samia [2 ]
Omar, Mawloud [3 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Lab Informat Med, Bejaia 06000, Algeria
[2] CNAM, CEDRIC Lab, Paris, France
[3] Univ Bejaia, Fac Sci Exactes, LAMOS, Bejaia 06000, Algeria
关键词
Key management; Security; Internet of things; Dynamic networks; MODEL-CHECKER; PROTOCOL; INTERNET; THINGS;
D O I
10.1016/j.adhoc.2019.102003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key management is the central element of network security. In fact, key distribution is necessary for securing applications in the context of Internet of Things (IoT). However, existing key management protocols are not directly applicable on IoT due, among other things, to severe and high resource constraints of some devices that make up the IoT network. Therefore, it is necessary that the proposed key management protocols takes in charge these features and constraints. Most existing solutions didn't focus on optimizing, at the same time, all performance criteria, like communication, computation and storage. Some of them put special emphasis on minimizing one criteria but ignore the others. In this paper, we propose a new lightweight matrix based key management protocol for lot network, which is not only flexible, scalable and resilient to many types of attacks, but also can reduce the communication, computation and storage overheads at constrained nodes side. The security properties like authentication, integrity and secrecy have been checked by using the formal verification tool AVISPA. Moreover, security and performance analysis show that our scheme protects user's sensitive data from several types of attacks by achieving secure end-to-end communications, and optimizes the energy consumption, which is suitable for resource-limited networks. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:15
相关论文
共 23 条
  • [1] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [2] SATMC: A SAT-based model checker for security protocols
    Armando, A
    Compagna, L
    [J]. LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 : 730 - 733
  • [3] Arthur W., 2015, A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security, V1st
  • [4] Basin D, 2003, LECT NOTES COMPUT SC, V2808, P253
  • [5] Internet of Things for Enterprise Systems of Modern Manufacturing
    Bi, Zhuming
    Xu, Li Da
    Wang, Chengen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) : 1537 - 1546
  • [6] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [7] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [8] Chevalier Y., 2004, Workshop on Specification and Automated Processing of Security Requirements-SAPS'2004, P13
  • [9] On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
    de Meulenaer, Giacomo
    Gosset, Francois
    Standaert, Francois-Xavier
    Pereira, Olivier
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 580 - 585
  • [10] Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548