Abstract
Information and communication security is a critical concern in the rapid growth of Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key management is essential to address such networks’ security problems. In this context, several existing research work focuses on key management solutions, which consider the resource-limitation of IoT devices. However, the weaknesses of these solutions are (1) the lack of protection for sensitive parameters during transmission, (2) security and performance metrics’ misbalancing, and (3) the vulnerability to node-compromising attacks. This paper presents a new key management scheme based on pre-distributed vectors to overcome these limits to secure key establishment, refresh, and revocation. Moreover, the network area is divided into subareas, which makes our solution lightweight, flexible, scalable, and resilient to multiple attacks while minimizing communications, computation, and storage overheads on IoT devices. We assess the proposed scheme by using (1) the BAN (Burrows Abadi Needham) formal verification logic, (2) the informal security to demonstrate its resilience against some known attacks, and (3) the performance analysis to prove its correctness. The obtained results show that the proposed scheme is more efficient than other schemes in terms of storage by saving more than 81.84%, communications by 100% during the group-wise key establishment, computation overheads by reducing the number of multiplication operations to 50%, and energy consumption by saving up to 99.99% during the group-wise key establishment phase. Moreover, the results show that our scheme is more resilient against node capture attacks by up to 96.43% during the initialization phase and by more than 9.89% after, making it suitable for use in resource-limited IoT networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.