Abstract
Rapid development of Internet of Things technology makes the Internet interact and communicate with objects in the real world. The diversity of Internet of Things’ system architectures and the diversity of networks determine the complexity of their security issues. A key step in building an Internet of Things’ security system is to build a model and evaluate threats of security. First, this paper studies the distribution of key security about mobile ad hoc networks and analyzed the characteristics of the scene. To promote the certification of the key exchange strategy of both sides, it supports key exchange between the core node and multiple nodes for existing problems that management scheme of random key preallocation is limited by the storage space of the node through combination of key matrix elements which has less information to generate a large number of keys, and each sensor node only needs to store related parameters and key matrix. It saves the memory space of node greatly. The results of simulation show that the program has a strong security; it can fight against the common attacks of wireless sensor networks, such as node forgery attacks, message replay attacks, and denial of service attacks. At the same time, it is superior to traditional solutions in terms of network connectivity and nondestructibility, which can apply clustered wireless sensor network massively.
Highlights
With the continuous advancement of network and communication technologies, information transmission is becoming more and more convenient, and the amount of data carried on the information network is increasing
Since the number of sensor nodes in the Internet of Things is huge, and most of them exist in the form of clusters, when information is transmitted in the network, a large number of sensing node information transmission and forwarding requests will cause network congestion and denial of service attacks
For the subkey generation time, we compare our strategy with several other strategies
Summary
With the continuous advancement of network and communication technologies, information transmission is becoming more and more convenient, and the amount of data carried on the information network is increasing. The process of key transmission is inconvenient and will form new security holes This key system is not a classic public key system, and encryption and decryption use different keys [8]. Quantum key distribution (MDI QKD) independent of measurement equipment is an effective way to share secrets using untrusted measurement devices In this promising protocol, assumptions about the characterization of the coding state are still necessary, which may lead to unnecessary complexity and potential vulnerabilities in actual implementation [12]. This paper studies the key security distribution of mobile ad hoc networks and analyzes the characteristics of the scenarios to promote the authentication of the key exchange strategies. It is superior to traditional solutions in terms of network connectivity and nondestructibility and can be applied to large-scale clustered wireless sensor networks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.