Abstract

Many IOT devices(mainly networks of IOT devices or networks that are deployed to monitor calamity situations) are deployed in an arbitrary and unplanned fashion. For any sensor in such a network can end up being adjacent node to any other IOT node in the network. To Establish a secure communication between every pair of adjacent IOTs node in such a network, each sensor node x in the network needs to store n -1 number of symmetric keys that sensor node x shares with all the other sensor nodes, where n is the number of sensor nodes in the present network. This memory storage requirement of the keying protocol is various, especially when n is large and the available storage in each sensor node is modest. Previous efforts to redesign this keying protocol and reduce the number of keys to be stored in each sensor node have produced protocols that are vulnerable to impersonation, eavesdropping, and collusion attacks. In this paper, we present a fully secure protocol.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call