Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks

被引:0
|
作者
Liu Z. [1 ]
Luo Y. [2 ]
机构
[1] Chongqing University of Posts and Telecommunications, Chongqing
[2] Chongqing Technology and Business Institute, Chongqing
关键词
Connectivity rate; Dynamic coefficient; IoT; Key management; Resource overhead; Security;
D O I
10.7717/PEERJ-CS.1726
中图分类号
学科分类号
摘要
Background: With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations, and the operating efficiency and security of IoT are greatly challenged. Key management is the core element of network security and one of the most challenging security problems faced by wireless sensor networks. A suitable key management scheme can effectively defend against network security threats. However, among the key management schemes that have been proposed so far, most of them do not take into account the efficiency in terms of connectivity rate and resource overhead, and some of them even have security risks. Methods: In this article, based on the symmetric polynomial algorithm, a dynamic coefficient symmetric polynomial key management scheme is proposed to better solve the IoT security problem. In this scheme, the nodes’ IDs are mapped into the elements of the shared matrix M by the identity mapping algorithm, and these elements are used to construct polynomials P(x,y) to generate pairwise keys. The communicating nodes have their own coefficients of P(x,y) and thus have higher connectivity. Results: The overall performance evaluation shows that the scheme significantly improves the resilience against node capture and effectively reduces the communication and storage overheads compared to the previous schemes. Moreover, the scheme overcomes the λ-security of symmetric polynomial key management scheme, and is able to provide a large pool of polynomials for wireless sensor networks, facilitating large-scale application of nodes. © Copyright 2023 Liu and Luo
引用
收藏
相关论文
共 50 条
  • [31] Distributed Key Management Authentication algorithm in Internet of Things (IOT)
    Rachini, Ali S.
    Khatoun, R.
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [32] A New Frequency Hopping Scheme to Secure the Physical Layer in The Internet of Things (IoT)
    Alsadi, Ali
    Mohan, Seshadri
    2020 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2020,
  • [33] How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes
    Mitchell, Chris J.
    IET INFORMATION SECURITY, 2021, 15 (03) : 223 - 230
  • [34] Index-Modulation-Based Key Exchange Scheme for Internet of Things Networks
    Alshamaseen, Tasneem
    Althunibat, Saud
    Qaraqe, Marwa
    Illi, Elmehdi
    Usman, Muhammad
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 2606 - 2617
  • [35] Group and hierarchical key management for secure communications in internet of things
    Karrothu, Aravind
    Norman, Jasmine
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [36] SDACS: Blockchain-Based Secure and Dynamic Access Control Scheme for Internet of Things
    Gong, Qinghua
    Zhang, Jinnan
    Wei, Zheng
    Wang, Xinmin
    Zhang, Xia
    Yan, Xin
    Liu, Yang
    Dong, Liming
    SENSORS, 2024, 24 (07)
  • [37] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu W.
    Chen X.
    Jiang L.
    Alexandria Engineering Journal, 2024, 101 : 52 - 61
  • [38] ELQI-Key: Symmetric Key Generation Scheme for Internet-of-Things (IoT) Devices Using Wireless Channel Link Quality
    Kuruwatti, Nandini
    Nayana, Y. N.
    Sarole, Nikhita
    Revadigar, Girish
    Javali, Chitra
    2018 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2018,
  • [39] Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks
    Ahmed, Aneeqa
    Qureshi, Kashif Naseer
    Anwar, Muhammad
    Masud, Farhan
    Imtiaz, Junaid
    Jeon, Gwanggil
    WIRELESS NETWORKS, 2024, 30 (05) : 4237 - 4259
  • [40] Polly Two : A New Algebraic Polynomial-based Public-Key Scheme
    Le Van Ly
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 267 - 283