| Literature DB >> 28338632 |
Zahid Mahmood1, Huansheng Ning2, AtaUllah Ghafoor3.
Abstract
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.Entities:
Keywords: hashing; node storage; path key; polynomial; proxy node; symmetric
Year: 2017 PMID: 28338632 PMCID: PMC5419783 DOI: 10.3390/s17040670
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Heterogeneous WSN-based IoT architecture.
Figure 2Network model of multi-party key establishment scenario.
Figure 3Polynomial computation at a H-sensor.
List of Notations for EKM.
| Notation | Description |
|---|---|
|
| Polynomial Value |
|
| ID of member Node |
|
| Hash of Node ID |
| Cluster Size, Network Size | |
|
| Array of Node IDs from |
| Number of Random Hash Values | |
| Cluster Head, Base Station | |
|
| Key between |
|
| Master Key |
| Key between | |
|
| Message Authentication Code of |
|
| List of ordinary sensors |
|
| Array of Hash values |
| Polynomial for | |
| Message 1 to 4 | |
| Cipher texts of | |
|
| Hash calculated at |
|
| Concatenated string at |
Figure 4Intra-cluster key establishment.
Figure 5Polynomial calculation algorithm.
Figure 6Network setup protocol.
Figure 7Node addition protocol flow diagram.
Figure 8Node migrations and addition protocol.
Figure 9Node migration setup and new intra-group session keys.
Local set for EKM.
| POSS(Li) = {IDLi, KLi − CHj} | Receive(CHj, {IDBS, C3}) |
Figure 10Polynomial computational cost in (a) and energy consumptions in (b).
Figure 11Latency comparisons in (a) communication energy in (b).
Figure 12Performance analysis on communication cost where (a) represents the message count and (b) represents the size of data exchanged.
Figure 13Storage overhead comparison.
Figure 14Energy for polynomial generation is presented in (a) and key generation energy in (b).