Abstract
In this article, a novel pseudorandom key chaining (PRKC) algorithm is introduced and evaluated. This lightweight symmetric scheme enables a transmission-triggered time variation of group keys in low-power wireless networks during broadcasting or multicasting. The proposed algorithm uses pseudorandom (PR) sequences, generated at the physical (PHY) layer of radio transceivers during a communication session, to symmetrically refresh the encryption keys on both sides of a communication link. This solution is scalable and suitable for large networks of nodes with limited resources in an Industrial Internet-of-Things (IIoT) environment. The strength of generated keys was tested with the use of the National Institute of Standards and Technology Special Publication 800-22 (NIST SP 800-22) statistical suit. No binary patterns that may indicate a vulnerability were detected. The randomness of generated key sequences was further analyzed with the use of strange attractors approach which demonstrated that these sequences are robust against attacks, such as spoofing or intelligent brute forcing. To assess the real-time delay and computational overhead of the algorithm, it was implemented on a Raspberry Pi board. The results demonstrated that the PRKC algorithm runs over 60% faster and requires over 40% less CPU effort per round than the conventional hashing-based schemes. In addition, it does not require any communication overhead and transmission energy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.