A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

sensors Article A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks Zahid Mahmood 1, Huansheng Ning 1,* and AtaUllah Ghafoor 2 1 School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China; [email protected] 2 Department of Computer Science, National University of Modern Languages, Islamabad 44000, Pakistan; [email protected] * Correspondence: [email protected], Tel.: +86-136-0131-7155 Academic Editors: Yunchuan Sun, Zhipeng Cai and Antonio Jara Received: 3 February 2017; Accepted: 18 March 2017; Published: 24 March 2017 Abstract: Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. Keywords: path key; symmetric; polynomial; hashing; proxy node; node storage 1. Introduction A recent advancement in communication technology, Wireless Sensor Networks (WSNs) are widely used in several applications [1]. The science community has focused on the security of WSNs. Because of the resource-constrained environment of the WSNs, classic security mechanisms are not practical since they consume too much energy; hence researchers are proposing new lightweight security mechanisms for every possible security aspect of WSNs. WSNs consist of many small, low-cost, self-governing ends called sensor nodes with little ability to manipulate data [2] and with constrained computing, energy, and memory. MICA2 Motes use 8 bit, 16 MHz processors with 4 K bytes of Sensors 2017, 17, 670; doi:10.3390/s17040670 www.mdpi.com/journal/sensors Sensors 2017, 17, 670 2 of 20 Sensors 2017, 17, 670 2 of 20 4 K bytes of electronically erasable programmable read only memory (EEPROM) and 128 K bytes of electronicallyprogrammable erasable memory programmable [3]. With the read passage only of memory time, the (EEPROM) sizes of WSN and 128 are K growing bytes of programmablein clusters [4]. memoryTraditional [3]. security With the mechanisms passage of time,using the public sizes ofkey WSN cryptography are growing cause in clusters significant [4]. Traditional overhead securityregarding mechanisms computation using and public commu keynication. cryptography Key management cause significant is mandatory overhead regardingand more computation challenging andwith communication.limited resources Key in management WSNs [5]. Many is mandatory researchers and morehave challengingbeen recognized with limitedthat grouped resources or indispersed WSNs [5heterogeneous]. Many researchers sensor have systems been recognizedcan sensibly that perform grouped orwith dispersed system heterogeneouseffectiveness, sensoroperational systems execution, can sensibly and enduring perform withsystem system lifetimes. effectiveness, operational execution, and enduring systemIn lifetimes.a heterogeneously grouped approach, as described in Figure 1, the low end sensor (L-sensorsIn a heterogeneously) are resource-constrained grouped approach, devices aswith described low power, in Figure short1, communication the low end sensor range, ( L-sensors) limited arememory, resource-constrained and less computation devices power with. lowOn power,the other short hand, communication H-sensors are range,equipped limited with memory, tamper andresistance less computation and have power.enough On resources, the other l hand,ike highH-sensors battery are power, equipped broad with communication tamper resistance ranges, and havesufficient enough memory, resources, and like high high computational battery power, capabil broadities. communication L-sensors are ranges, deliberatel sufficienty conveyed memory, in and a highgroup, computational and every group capabilities. is controlL-sensorsled by a are group deliberately head (H conveyed-sensor). The in a L group,-sensors and essential every grouply sense is controlledenvironmental by a statistics group head and (H-sensor). forward it Theto theL-sensors H-sensors essentially and the senseother environmentalway around. H statistics-sensors andcan forwardperform itcompl to the exH-sensors operations and theon other the way sensor around. information,H-sensors canand perform utilize complex longer operations radio and on thestraight sensorforwardl information,y transfer and it utilizeto the longerbase-station. radio andThe straightforwardlybase-station (BS) is transfer a powerful it tothe hub, base-station. and it has Theabundant base-station sources (BS). The is aBS powerful might be hub, a remote and it has server, abundant and it sources. might Thebe connected BS might bewith a remote the external server, andworl itd mightutilizing be connectedthe accelerated with Internet. the external world utilizing the accelerated Internet. Figure 1. HeterHeterogeneousogeneous WSN-basedWSN-based IoT architecture.architecture. Various anonymousanonymous securitysecurity protocolsprotocols have beenbeen recommendedrecommended for heterogeneousheterogeneous WSNs in recent past,past, andand they they display display diverse diverse sorts sorts as as well wel asl as levels level ofs securityof security protection protection at various at various cost. cost. In this In section,this section, we discuss we discuss the existing the cryptographyexisting cryptography techniques thattechniques addressed that the address issue ofed authentication the issue inof heterogeneousauthentication WSNs.in heterogeneous Due to the limitedWSNs. resourcesDue to the of WSNs,limited aresources sound balance of WSNs, between a sound security bal levelance andbetween the associated security l energyevel and utilization the associated overhead energy is needed utilization to mitigate overhead the security is needed threats. to mitigate Symmetric the parameterssecurity threats. such asSymmetric node ID, messageparameters authentication such as node code, ID, nonce message number, authentication and time stamps code, arenonce the significantnumber, and parameters time stamps for grouped are the significant key management parameters techniques for grouped which arekey energy management efficient techniques and avoid thewhich different are energy type of efficient attacks fromand avoid malicious the nodesdifferent and type avoid of nodeattacks compromising from malicio attacks.us nodes Most and security avoid protocolsnode compromis developeding forattack WSNss. Most use symmetric security encryption,protocols devel dueoped to ease for of WSN its implementations use symmetric [6]. Besidesencryption, this, due single to nodeease authenticationof its implementation has become [6]. unableBesides to this, meet singl thee increasing node authentication communication has demand,become unabl as thee serviceto mee demandt the increasing increases communication with the passage demand, time, multiparty as the service computing demand is necessary increas fores nodewith authenticationthe passage time, simultaneously multiparty computing and securely is inter-clusternecessary for and node intra-cluster authentication where simul [7] participantstaneously collectivelyand securel toy inter set up-cl auster mutual and session intra-cl keyuster to where enable the[7] participants multi-party computingcollectively and to set secure up exchangea mutual ofsession messages. key to enable the multi-party computing and secure exchange of messages. Multi-partyMulti-party computingcomputing for securityfor security credential credential calculations calcul hasations been adoptedhas been using adopted many-to-many using nodesmany-to communication-many nodes scenarios.communication Conventional scenarios. node Conventional authentication node involves authentication computation atinvol singleves sensorcomputation node at for singl thee entiresensor

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us