A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things

被引:11
作者
Han, Song [1 ]
Gu, Mianxue [1 ]
Yang, Bailin [1 ]
Lin, Jianhong [2 ]
Hong, Haibo [1 ]
Kong, Mengjiao [1 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Ponshine Informat Technol Co Ltd, Hangzhou 310012, Zhejiang, Peoples R China
关键词
Internet of Things; healthcare; key distribution; self-healing; trust; WIRELESS SENSOR NETWORKS; DISTRIBUTION SCHEME; MANAGEMENT SCHEME; AUTHENTICATION SCHEME; EFFICIENT; PRIVACY; ACCESS; LOGIC;
D O I
10.1109/ACCESS.2019.2935797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) can enable cyber-physical objects to communicate with one another and realize real-time living-needs control such as for vehicles, smart phones, refrigerators, healthcare gadgets and air-conditioners. Of the applications of IoT, collecting and receiving health-related data securely is the most crucial and significant use in the fields of community and hospital healthcare, where any single communication failure or data loss might cause a life damage risk. To address this problem, self-healing mechanism can be used for facilitating secure communications and recovering from the lost data. In this paper, a new key distribution with self-healing for IoT objects of community healthcare is proposed, and the underlying system is composed of two layers. In the top layer, the new scheme implements both deterministic security link and access control which are based on polynomial-based methods. In the bottom layer, we propose a trust-based key distribution scheme with self-healing and a singular value decomposition (SVD) based authentication method. Security and performance analysis show that our protocol can be performed more efficiently in data communication. In addition, results obtained from both security analysis and simulations indicate that our scheme is more suitable for IoT networks.
引用
收藏
页码:114060 / 114076
页数:17
相关论文
共 53 条
[21]   Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection [J].
Bao, Fenye ;
Chen, Ing-Ray ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE Transactions on Network and Service Management, 2012, 9 (02) :169-183
[22]   Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey [J].
Govindan, Kannan ;
Mohapatra, Prasant .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02) :279-298
[23]   Management and applications of trust in Wireless Sensor Networks: A survey [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shu, Lei ;
Niu, Jianwei ;
Chao, Han-Chieh .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :602-617
[24]  
Han S., 2010, Innovative Smart Grid Technologies (ISGT), V2010, P1
[25]   ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (04) :623-632
[26]   An efficient key distribution scheme with self-healing property [J].
Hong, D ;
Kang, JS .
IEEE COMMUNICATIONS LETTERS, 2005, 9 (08) :759-761
[27]   An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks [J].
Janani, V. S. ;
Manikandan, M. S. K. .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (03) :857-876
[28]  
Jiang R, 2013, IEEE INT CONF COMMUN, P686, DOI 10.1109/ICCChina.2013.6671199
[29]  
Kurnio H, 2002, LECT NOTES COMPUT SC, V2384, P40
[30]   TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks [J].
Marmol, Felix Gomez ;
Martinez Perez, Gregorio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :934-941