A CFL-Based Key Management Scheme for Routing-Driven Internet of Things

被引:0
|
作者
Wang, Jiuru [1 ]
Sun, Chongran [1 ]
Wang, Haifeng [1 ]
Zhao, Bin [1 ]
Gong, Ping [1 ]
机构
[1] Linyi Univ, Sch Informat Sci & Engn, Linyi 276005, Shandong, Peoples R China
关键词
D O I
10.1155/2022/1059997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study is aimed at the authentication problem between the node's public key and the node in the sensor network of the Internet of Things(IoT). As well as the sensor node key distribution needs to verify trusted nodes, resulting in a lot of storage and computational overhead problems. A routing-driven key management scheme for the IoT based on identification certificate authentication system is proposed. The scheme takes the identification key pair of the node as the verification key to verify the random key pair generated by the node to ensure that the whole process does not need the intervention of a trusted third party; random key pairs are generated by nodes independently to ensure that each sensor node has different keys. When a node is broken, it will not cause damage to other nodes. At the same time, the shared key is only established for adjacent sensor nodes that communicate with each other to ensure the security and lightweight storage overhead of the sensor nodes. The experimental analysis shows that the scheme can provide better security, can effectively reduce sensor nodes' storage space and energy consumption, and has higher advantages in safety and performance.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things
    Hsiao, Tsung-Chih
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    Chung, Yu-Fang
    [J]. SENSORS AND MATERIALS, 2019, 31 (02) : 355 - 364
  • [22] A Channel State Information-Based Key Generation Scheme for Internet of Things
    Usman, Muhammad
    Althunibat, Saud
    Qaraqe, Marwa
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [24] Session Key Based an Efficient Cryptographic Scheme of Images for Securing Internet of Things
    Vidwans A.
    Ramaiya M.
    [J]. SN Computer Science, 4 (5)
  • [25] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu Z.
    Luo Y.
    [J]. PeerJ Computer Science, 2023, 9
  • [26] Index-Modulation-Based Key Exchange Scheme for Internet of Things Networks
    Alshamaseen, Tasneem
    Althunibat, Saud
    Qaraqe, Marwa
    Illi, Elmehdi
    Usman, Muhammad
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 2606 - 2617
  • [27] An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things
    Sowmya Gali
    Venkatram Nidumolu
    [J]. Cluster Computing, 2022, 25 : 1779 - 1789
  • [28] TSN-based routing and scheduling scheme for Industrial Internet of Things in underground mining
    Zhang, Yinghui
    Wu, Jiamin
    Liu, Mingli
    Tan, Aiping
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 115
  • [29] A social relationship-based energy efficient routing scheme for Opportunistic Internet of Things
    Rani
    Malik, Amita
    [J]. ICT EXPRESS, 2023, 9 (04): : 697 - 705
  • [30] An Energy-Efficient Routing Scheduling Based on Fuzzy Ranking Scheme for Internet of Things
    Chithaluru, Premkumar
    Kumar, Sunil
    Singh, Aman
    Benslimane, Abderrahim
    Jangir, Sunil Kumar
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) : 7251 - 7260