| Literature DB >> 32326650 |
Safwan Mawlood Hussein1, Juan Antonio López Ramos2, José Antonio Álvarez Bermejo3.
Abstract
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology's widespread applications increasing the number of connected devices constantly. IoT is built on sensor networks, which are enabling a new variety of solutions for applications in several fields (health, industry, defense, agrifood and agro sectors, etc.). Wireless communications are indispensable for taking full advantage of sensor networks but implies new requirements in the security and privacy of communications. Security in wireless sensor networks (WSNs) is a major challenge for extending IoT applications, in particular those related to the smart-agro. Moreover, limitations on processing capabilities of sensor nodes, and power consumption have made the encryption techniques devised for conventional networks not feasible. In such scenario, symmetric-key ciphers are preferred for key management in WSN; key distribution is therefore an issue. In this work, we provide a concrete implementation of a novel scalable group distributed key management method and a protocol for securing communications in IoT systems used in the smart agro sector, based on elliptic curve cryptography, to ensure that information exchange between layers of the IoT framework is not affected by sensor faults or intentional attacks. In this sense, each sensor node executes an initial key agreement, which is done through every member's public information in just two rounds and uses some authenticating information that avoids external intrusions. Further rekeying operations require just a single message and provide backward and forward security.Entities:
Keywords: Diffie–Hellman; IoT networks; IoT security; discrete logarithm problem; elliptic curves; secure key exchange; security protocol; sensor networks security; smart-agro; wireless sensor networks
Year: 2020 PMID: 32326650 PMCID: PMC7218854 DOI: 10.3390/s20082242
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Stages from collecting data to processing information: the importance of securing the data.
Figure 2Evolution of the Internet of Things (IoT) architecture for smart agro.
Figure 3Recommended IoT architecture of smart agro developments.
Comparison of protocols.
| Protocol | ING | BD | Ours | |
|---|---|---|---|---|
| Parameter | ||||
| Rounds |
| 2 | 2 | |
| # messages |
| 2n |
| |
| 1 by | ||||
| Msgs sent |
| 2 | 1 | |
| 1 | ||||
| Msgs received |
|
| 1 | |
| Modular Exp. by |
|
| - | |
| Modular Mult. by | - | - | 4 by | |
|
| ||||
Figure 4Response times intervals accepted as efficient.
Figure 5Node of the sensor network.
Figure 6Time needs to calculate the initial key agreement message.
Figure 7Size of the message created by .
Time (in ms) to get a node fully available (initial key agreement) in the secured wireless sensor network (WSN), using keys of 1024 bits.
| 1 Node | 10 Nodes | 100 Nodes | 1000 Nodes |
|---|---|---|---|
| 0.42 | 0.49 | 0.78 | 1.91 |
Figure 8Scaling of the protocol.