Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks

被引:0
|
作者
Carlier, Matthias [1 ]
Steenhaut, Kris
Braeken, An
机构
[1] Vrije Univ Brussel, Dept Elect & Informat, Brussels, Belgium
来源
2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH) | 2018年
关键词
Multicast; Security; Mutual authentication; Wireless sensor networks; Lagrange interpolation; Symmetric key; MANAGEMENT SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new key management protocol for group based communications for non hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric key based operations. The protocol features a cloud based network multicast manager (NMM), which can create, control and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. In order to investigate the validity of the proposed mechanisms, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi hop communication.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Multicast Scaling in Heterogeneous Wireless Sensor Networks for Security and Time Efficiency
    Vankdothu, Ramdas
    Hameed, Mohd Abdul
    Fatima, Husnah
    Subbarao, Akkala
    WIRELESS PERSONAL COMMUNICATIONS, 2025,
  • [22] Symmetric-key Generation Protocol (SGenP) for Body Sensor Network
    Kumari, Priti
    Anjali, Tricha
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [23] On bluetooth repairing: Key agreement based on symmetric-key cryptography
    Vaudenay, S
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 1 - 9
  • [24] Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks
    Soderi, S.
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (01) : 45 - 59
  • [25] Polynomial and matrix based key management security scheme in wireless sensor networks
    Dinker, Aarti Gautam
    Sharma, Vidushi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1563 - 1575
  • [26] A security routing protocol based on public key matrix for wireless sensor networks
    Huang, Jie
    Huang, Bei
    Journal of Convergence Information Technology, 2012, 7 (03) : 127 - 136
  • [27] A Security Architecture for Wireless Sensor Networks Based-on Public Key Cryptography
    Yao, Jianbo
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3648 - 3650
  • [28] Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks
    S. Soderi
    International Journal of Wireless Information Networks, 2020, 27 : 45 - 59
  • [29] Classification of Symmetric Key Management Schemes for Wireless Sensor Networks
    Bala, Suman
    Sharma, Gaurav
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 117 - 137
  • [30] Energy Efficient and Security Based Data Communication in Wireless Body Sensor Networks
    Sangaril, A. Siva
    Manickam, J. Martin Leo
    JOURNAL OF PURE AND APPLIED MICROBIOLOGY, 2015, 9 : 701 - 711