A hierarchical key pre-distribution scheme for fog networks

被引:10
作者
Bahrami, Pooneh Nikkhah [1 ]
Javadi, Hamid H. S. [2 ]
Dargahi, Tooska [3 ]
Dehghantanha, Ali [4 ,5 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Univ Tehran, Dept Comp Sci, Tehran, Iran
[2] Shahed Univ, Dept Comp Sci, Tehran, Iran
[3] Univ Salford, Sch Comp Sci & Engn, Manchester, Lancs, England
[4] Univ Sheffield, Dept Comp Sci, Sheffield, S Yorkshire, England
[5] Univ Guelph, Sch Comp Sci, Secur Adv Syst Lab, Guelph, ON, Canada
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
fog computing; hierarchical networks; key distribution; WIRELESS SENSOR NETWORKS; PREDISTRIBUTION SCHEME; SECURITY; MECHANISMS; FRAMEWORK; PRIVACY; ISSUES;
D O I
10.1002/cpe.4776
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security in fog computing is multi-faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end devices. This emphasizes the importance of designing efficient and secret key distribution scheme to facilitate fog nodes and end devices to establish secure communication channels. Existing secure key distribution schemes designed for hierarchical networks may be deployable in fog computing, but they incur high computational and communication overheads and thus consume significant memory. In this paper, we propose a novel hierarchical key pre-distribution scheme based on "Residual Design" for fog networks. The proposed key distribution scheme is designed to minimize storage overhead and memory consumption while increasing network scalability. The scheme is also designed to be secure against node capture attacks. We also demonstrate that, in an equal-size network, our scheme reduces node storage overhead significantly. Our research paves the way for building an efficient key management framework for secure communication within the hierarchical network of fog nodes and end devices.
引用
收藏
页数:14
相关论文
共 64 条
[1]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[2]  
[Anonymous], IFIP NETW C BROOKL N
[3]  
[Anonymous], 2013, P 2 ACM WORKSH HOT T
[4]  
[Anonymous], 2010, INT J NETWORK SECURI
[5]  
[Anonymous], 2012, 37 ANN IEEE C LOC CO
[6]  
[Anonymous], 5 INT C UB FUT NETW
[7]  
[Anonymous], 2012, P 1 ACM MCC WORKSH M
[8]  
[Anonymous], IEEE INF 2016 35
[9]  
[Anonymous], 2015, 3 IEEE WORKSH HOT TO
[10]  
[Anonymous], 1990, Combinatorial Designs - Construction Methods