Abstract

Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based on these decryption keys, the cluster head generates a common encryption key using bilinear pairing. Any sensor in the subgroup can decrypt the message, which is encrypted by the common encryption key. The remaining part focuses to reduce communication, computation and storage costs of the proposed framework and the resilience against various attacks. The implementation is carried out and results are compared with the existing schemes that have given considerably better results. Thus, the lightweight devices of IoT can provide efficiency and security by reducing their overhead in terms of complexity.

Highlights

  • Internet of Things (IoT) is developing quickly in the last decades and keeps on advancing in terms of dimension and complexity

  • The key distribution is not needed for the group communication through Cluster head (CH)

  • This paper proposes a cost effective decentralized key management framework for secure group communication

Read more

Summary

Introduction

Internet of Things (IoT) is developing quickly in the last decades and keeps on advancing in terms of dimension and complexity. IoT prevails in various application domains such as agriculture, space, healthcare, manufacturing, construction, water and mining It is a powerful element of generation wireless sensor network which comprises of low power devices. The security threats and vulnerabilities of IoT devices, which are featured with resource constraints and low transmission rates, are increasing day by day This brings the need for security solutions to ensure confidentiality and authentication. We require an energy efficient smart key management [2] with low communication and computation cost to ensures confidentiality and authentication. CSSE, 2022, vol., no.3 types of attacks such as inside, outside attacks Such techniques must ensure requirements of key management such as forward secrecy, backward secrecy, key independency and group secrecy [3].

Related Works
Elements of the Framework
BMU-IOT Key Management Method
Computational Performance Evaluation
Communication Cost
Storage Cost
Computation Cost
Security Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call