Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks

被引:0
作者
Carlier, Matthias [1 ]
Steenhaut, Kris
Braeken, An
机构
[1] Vrije Univ Brussel, Dept Elect & Informat, Brussels, Belgium
来源
2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH) | 2018年
关键词
Multicast; Security; Mutual authentication; Wireless sensor networks; Lagrange interpolation; Symmetric key; MANAGEMENT SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new key management protocol for group based communications for non hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric key based operations. The protocol features a cloud based network multicast manager (NMM), which can create, control and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. In order to investigate the validity of the proposed mechanisms, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi hop communication.
引用
收藏
页数:6
相关论文
共 20 条
[1]   Towards Efficient Publish-Subscribe Middleware in the IoT with IPv6 Multicast [J].
Akkermans, Sven ;
Bachiller, Rafael ;
Matthys, Nelson ;
Joosen, Wouter ;
Hughes, Danny ;
Vucinic, Malisa .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
[2]  
[Anonymous], 2006, P IEEE GLOBAL TELECO, DOI DOI 10.1109/GLOCOM.2006.943
[3]  
[Anonymous], AES128
[4]  
Bala S, 2013, INT J SECUR APPL, V7, P117
[5]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[6]   A Novel Group Key Agreement Scheme for Wireless Sensor Networks Based on Merkle Identity Tree [J].
Chen Li-qing ;
Sun Cheng-fu ;
Zhu Quan-yin .
ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 :869-875
[7]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[8]  
Guohua Ou, 2010, 2010 IEEE International Conference on Information Theory and Information Security, P358, DOI 10.1109/ICITIS.2010.5689600
[9]  
Hussain S., 2007, INT C WIRELESS COMMU, P388, DOI DOI 10.1145/1280940.1281023
[10]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772