Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications

被引:81
作者
Porambage, Pawani [1 ]
Braeken, An [2 ]
Schmitt, Corinna [3 ]
Gurtov, Andrei [4 ,5 ]
Ylianttila, Mika [1 ]
Stiller, Burkhard [3 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, Oulu 90014, Finland
[2] Vrije Univ Brussel, Dept Ind Engn, B-1000 Brussels, Belgium
[3] Univ Zurich, Dept Informat, Commun Syst Grp, CH-8050 Zurich, Switzerland
[4] Aalto Univ, Dept Comp Sci, Aalto 00076, Finland
[5] Aalto Univ, Helsinki Inst Informat Technol, Aalto 00076, Finland
来源
IEEE ACCESS | 2015年 / 3卷
关键词
Internet of Things; wireless sensor networks; multicast; security; group key establishment; AUTHENTICATION;
D O I
10.1109/ACCESS.2015.2474705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are a prominent fundamental technology of the Internet of Things (IoTs). Rather than device-to-device communications, group communications in the form of broadcasting and multicasting incur efficient message deliveries among resource-constrained sensor nodes in the IoT-enabled WSNs. Secure and efficient key management is in many cases used to protect the authenticity, integrity, and confidentiality of multicast messages. This paper develops two group key establishment protocols for secure multicast communications among the resource-constrained devices in IoT. Major deployment conditions and requirements of each protocol are described in terms of the specific IoT application scenarios. Furthermore, the applicability of the two protocols is analyzed and justified by a comprehensive analysis of the performance, scalability, and security of the protocols proposed.
引用
收藏
页码:1503 / 1511
页数:9
相关论文
共 22 条
  • [1] [Anonymous], [No title captured]
  • [2] [Anonymous], 2014, DTLS BASED MULTICAST
  • [3] [Anonymous], 2001, IACR e-Print Arch.
  • [4] ARKKO J., 2004, MIKEY: Multimedia Internet KEYing
  • [5] Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
    Cao, Xuefei
    Zeng, Xingwen
    Kou, Weidong
    Hu, Liangbing
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) : 3508 - 3517
  • [6] On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
    de Meulenaer, Giacomo
    Gosset, Francois
    Standaert, Francois-Xavier
    Pereira, Olivier
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 580 - 585
  • [7] Di Pietro R, 2013, IEEE INFOCOM SER, P205
  • [8] Hankerson D., 2012, Guide To Elliptic Curve Cryptography
  • [9] Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Harn, Lein
    Lin, Changlu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) : 842 - 846
  • [10] DTLS based security and two-way authentication for the Internet of Things
    Kothmayr, Thomas
    Schmitt, Corinna
    Hu, Wen
    Bruenig, Michael
    Carle, Georg
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2710 - 2723