Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks

被引:0
|
作者
Carlier, Matthias [1 ]
Steenhaut, Kris
Braeken, An
机构
[1] Vrije Univ Brussel, Dept Elect & Informat, Brussels, Belgium
来源
2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH) | 2018年
关键词
Multicast; Security; Mutual authentication; Wireless sensor networks; Lagrange interpolation; Symmetric key; MANAGEMENT SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new key management protocol for group based communications for non hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric key based operations. The protocol features a cloud based network multicast manager (NMM), which can create, control and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. In order to investigate the validity of the proposed mechanisms, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi hop communication.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    Lalitha, T.
    Jayaprabha, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (02) : 349 - 367
  • [12] An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
    Haque, Md. Mokammel
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    Huh, Eui-Nam
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (05): : 265 - 279
  • [13] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    T. Lalitha
    S. Jayaprabha
    Wireless Personal Communications, 2016, 87 : 349 - 367
  • [14] A Secret Key-Based Security Architecture for Wireless Sensor Networks
    Chowdhury, Anuva
    Tanzila, Farzana Alam
    Chowdhury, Shanta
    Haque, Md. Mokammel
    2015 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION ENGINEERING (ICCIE), 2015, : 79 - 82
  • [15] Power Assignment for Symmetric Communication in Wireless Sensor Networks
    Park, Joongseok
    Sahni, Sartaj
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (02): : 185 - 200
  • [16] On the security of cluster-based communication protocols for wireless sensor networks
    Ferreira, AC
    Vilaca, MA
    Oliveira, LB
    Habib, E
    Wong, HC
    Loureiro, AA
    NETWORKING - ICN 2005, PT 1, 2005, 3420 : 449 - 458
  • [17] Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
    Porambage, Pawani
    Braeken, An
    Schmitt, Corinna
    Gurtov, Andrei
    Ylianttila, Mika
    Stiller, Burkhard
    IEEE ACCESS, 2015, 3 : 1503 - 1511
  • [18] Cryptanalysis on symmetric key techniques based authentication scheme for wireless sensor networks
    Choi, Younsung
    Lee, Youngsook
    Won, Dongho
    Lecture Notes in Electrical Engineering, 2015, 373 : 7 - 13
  • [19] Research on data transmission of wireless sensor networks based on symmetric key algorithm
    Zhou, Wei
    Li, Ping
    Wang, QinJu
    Nabipour, Narjes
    MEASUREMENT, 2020, 153
  • [20] Symmetric-Key Encryption Based on Bioaffinity Interactions
    McGoldrick, Leif K.
    Weiss, Elizabeth A.
    Halamek, Jan
    ACS SYNTHETIC BIOLOGY, 2019, 8 (07): : 1655 - 1662