A Full-Healing Key Distribution Scheme for Resource-Constrained Devices

被引:0
|
作者
Messai, Sarra [1 ,3 ]
Messai, Mohamed-Lamine [2 ]
Seba, Hamida [3 ]
Aliouat, Zibouda [1 ]
机构
[1] Univ Ferhat Abbas Setif 1, Fac Sci, Dept Informat, Algiers 19000, Algeria
[2] CPE Lyon, Lyon, France
[3] Univ Lyon 1, Univ Lyon, CNRS, LIRIS,UMR5205, F-69622 Lyon, France
关键词
PRE-DISTRIBUTION; SENSOR;
D O I
10.1109/ict-dm47966.2019.9032926
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of the Internet of Things (IoT), more and more devices are connected to the Internet and the most challenging issue will be security. For resource-constrained devices, applying a heavy asymmetric cryptography mechanism is not workable. However, a symmetric crypto-system is resource efficient and can be applied. The robustness of a symmetric crypto-system is based on successful key management schemes. However, most proposed key management schemes either focus on static connected devices and do not consider addition of new devices and their mobility or fail to provide sufficient resilience to node compromising attacks. In fact, device additions are suited for applications that require a long time of existence. However, these applications are very sensitive to node compromising attacks. This paper presents a new random key pre -distribution scheme designed for networks of resource-constrained devices. The proposed scheme ensures full -healing when devices are compromised and supports device mobility. The comparison of our scheme with respect to other key pre-distribution solutions shows its efficiency.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Group Key Distribution with Full-Healing Property
    Liu, Ya-Nan
    Harn, Lein
    Mao, Lei
    Wang, Yi
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [2] Secured-KDS: Secret key distribution and authentication scheme for resource-constrained devices
    Manickam, Selvakumar
    Ul Rehman, Shafiq
    [J]. IET NETWORKS, 2023, 12 (01) : 1 - 8
  • [3] A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network
    Aski, Akbar Morshed
    Javadi, Hamid Haj Seyyed
    Shirdel, Gholam Hassan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2079 - 2103
  • [4] A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network
    Akbar Morshed Aski
    Hamid Haj Seyyed Javadi
    Gholam Hassan Shirdel
    [J]. Wireless Personal Communications, 2020, 114 : 2079 - 2103
  • [5] Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks
    Wang, Qiuhua
    Chen, Huifang
    Xie, Lei
    Wang, Kuang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1363 - 1374
  • [6] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [7] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685
  • [8] Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks
    Guo, Hua
    Zheng, Yandong
    Zhang, Xiyong
    Li, Zhoujun
    [J]. SENSORS, 2016, 16 (05)
  • [9] A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
    Esfehani, Neda Solari
    Javadi, Hamid Haj Seyyed
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (04) : 2905 - 2934
  • [10] A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
    Neda Solari Esfehani
    Hamid Haj Seyyed Javadi
    [J]. Wireless Personal Communications, 2022, 127 : 2905 - 2934