A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities

被引:15
作者
AbuAlghanam, Orieb [1 ,2 ]
Qatawneh, Mohammad [1 ]
Almobaideen, Wesam [1 ,3 ]
Saadeh, Maha [4 ]
机构
[1] Univ Jordan, Comp Sci Dept, Amman, Jordan
[2] Al Ahliyya Amman Univ, Dept Networks & Informat Secur, Amman, Jordan
[3] Rochester Inst Technol Dubai, Dubai, U Arab Emirates
[4] Middlesex Univ Dubai, Dept Comp Engn & Informat, Dubai, U Arab Emirates
关键词
Hierarchical key distribution architecture; Hybrid hierarchical key distribution protocol; Internet of Things; Smart cities; AVISPA simulation tool; WIRELESS SENSOR NETWORKS; DISTRIBUTION SCHEME; MANAGEMENT; INTERNET; DESIGN; MOBILE;
D O I
10.1016/j.jisa.2022.103173
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a system of objects such as traditional computers, cameras, sensors and other things that are interconnected via a network to gather, process, and exchange context relevant data. Security is considered as one of the most important challenges facing IoT. Key distribution techniques are at the core of security provision and are critical components of any system in order to establish a secure connection between any two objects. In this paper a new Hierarchical Key Distribution (HKD) architecture and a set of Hierarchical Hybrid Key Distribution (H2KD) protocols are presented for IoT environment to support the provision of smart cities applications. The applicability of this protocols has been studied over HKD architecture and simulated using AVISPA tool and using Burrows-Abadi-Needham (BAN) logic. The targeted features of designing the architecture and the protocols are supporting mobility, scalability, heterogeneity and supporting constrained nodes' limited capabilities. The performance of H2KD set of protocols has been evaluated based on a quantitative measure of several performance metrics including the memory storage, the computation cost for the constraint nodes, the number of messages exchanged and needed to establish a new session key for a mobile node. Scalability and resilience of the proposed protocols have been also measured. Simulation results show that H2KD protocols are safe against various attacks. Moreover, the analysis results show that the H2KD reduces communication, computation, and the storage costs for constraint nodes by 51.5% compared with related protocols. Additionally, H2KD has been found to provide more scalability and resilience than rival protocols.
引用
收藏
页数:18
相关论文
共 70 条
[1]  
Abu Alghanam O., 2019, Journal of Theoretical and Applied Information Technology, V97
[2]   A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer [J].
Alazzam, Hadeel ;
Sharieh, Ahmad ;
Sabri, Khair Eddin .
APPLIED INTELLIGENCE, 2022, 52 (04) :3527-3544
[3]  
Alazzam H, 2019, INT CONF INFORM COMM, P25, DOI [10.1109/IACS.2019.8809109, 10.1109/iacs.2019.8809109]
[4]   Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) [J].
Albakri, Ashwag ;
Harn, Lein ;
Song, Sejun .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[5]  
Almobaideen W, 2019, 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), P281, DOI 10.1109/JEEIT.2019.8717465
[6]   Understanding the IoT connectivity landscape: A contemporary M2M radio technology roadmap [J].
Andreev, Sergey ;
Galinina, Olga ;
Pyattaev, Alexander ;
Gerasimenko, Mikhail ;
Tirronen, Tuomas ;
Torsner, Johan ;
Sachs, Joachim ;
Dohler, Mischa ;
Koucheryavy, Yevgeni .
IEEE Communications Magazine, 2015, 53 (09) :32-40
[7]  
[Anonymous], 2011, PROCEDIA COMPUT SCI
[8]  
[Anonymous], 2017, THESIS U VICTORIA
[9]   A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme [J].
Anzani, M. ;
Javadi, H. Haj Seyyed ;
Moeni, A. .
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY TRANSACTION A-SCIENCE, 2018, 42 (A2) :777-786
[10]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281