Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks

被引:0
|
作者
Liu Z. [1 ]
Luo Y. [2 ]
机构
[1] Chongqing University of Posts and Telecommunications, Chongqing
[2] Chongqing Technology and Business Institute, Chongqing
关键词
Connectivity rate; Dynamic coefficient; IoT; Key management; Resource overhead; Security;
D O I
10.7717/PEERJ-CS.1726
中图分类号
学科分类号
摘要
Background: With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations, and the operating efficiency and security of IoT are greatly challenged. Key management is the core element of network security and one of the most challenging security problems faced by wireless sensor networks. A suitable key management scheme can effectively defend against network security threats. However, among the key management schemes that have been proposed so far, most of them do not take into account the efficiency in terms of connectivity rate and resource overhead, and some of them even have security risks. Methods: In this article, based on the symmetric polynomial algorithm, a dynamic coefficient symmetric polynomial key management scheme is proposed to better solve the IoT security problem. In this scheme, the nodes’ IDs are mapped into the elements of the shared matrix M by the identity mapping algorithm, and these elements are used to construct polynomials P(x,y) to generate pairwise keys. The communicating nodes have their own coefficients of P(x,y) and thus have higher connectivity. Results: The overall performance evaluation shows that the scheme significantly improves the resilience against node capture and effectively reduces the communication and storage overheads compared to the previous schemes. Moreover, the scheme overcomes the λ-security of symmetric polynomial key management scheme, and is able to provide a large pool of polynomials for wireless sensor networks, facilitating large-scale application of nodes. © Copyright 2023 Liu and Luo
引用
收藏
相关论文
共 50 条
  • [1] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [2] Dickson polynomial-based secure group authentication scheme for Internet of Things
    Salman Ali Syed
    Selvakumar Manickam
    Mueen Uddin
    Hamed Alsufyani
    Mohammad Shorfuzzaman
    Shitharth Selvarajan
    Gouse Baig Mohammed
    Scientific Reports, 14
  • [3] Dickson polynomial-based secure group authentication scheme for Internet of Things
    Syed, Salman Ali
    Manickam, Selvakumar
    Uddin, Mueen
    Alsufyani, Hamed
    Shorfuzzaman, Mohammad
    Selvarajan, Shitharth
    Mohammed, Gouse Baig
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [4] Cryptanalysis of a polynomial-based key management scheme for secure group communication
    Kamal, A.A. (a_kamala@ece.concordia.ca), 1600, Femto Technique Co., Ltd. (15):
  • [5] Hierarchical Polynomial-based Key Management Scheme in Fog Computing
    Albakri, Ashwag
    Maddumala, Mahesh
    Harn, Lein
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1593 - 1597
  • [6] An Enhanced Polynomial-based Key Establishment Scheme for Wireless Sensor Networks
    Hu Tong-sen
    Chen Deng
    Tian Xian-zhong
    2008 INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND TRAINING AND 2008 INTERNATIONAL WORKSHOP ON GEOSCIENCE AND REMOTE SENSING, VOL 2, PROCEEDINGS,, 2009, : 809 - 812
  • [7] An improved Polynomial-Based Key Predistribution Scheme for Wireless Sensor Networks
    Dai, Hangyang
    Xu, Hongbing
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 477 - 481
  • [8] An Efficient Symmetric Polynomial-based Key Establishment Protocol for Wireless Sensor Networks
    Fanian, Ali
    Berenjkoub, Mehdi
    Saidi, Hossein
    Gulliver, T. Aaron
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (02): : 89 - 105
  • [9] Verifiable symmetric polynomial-based key distribution schemes
    Liu, Yan-xiao
    Zhang, Yu-qing
    Harn, Lein
    Hu, Yu-pu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1028 - 1034
  • [10] Polynomial-based key pre-distribution scheme in wireless mesh networks
    Zhang, Yuexin
    Xu, Li
    Huang, Xinyi
    Journal of Computational Information Systems, 2012, 8 (06): : 2539 - 2549