Efficient Key Management in IoT Using Mobile Aggregator
Managing keys in Internet of Things (IoT) is challenging. With this proposed work we are trying to address an efficient key management protocol for specific application based scenario which enforces secure connectivity of devices and minimizes node captur
- PDF / 538,697 Bytes
- 12 Pages / 439.37 x 666.142 pts Page_size
- 17 Downloads / 198 Views
Abstract. Managing keys in Internet of Things (IoT) is challenging. With this proposed work we are trying to address an efficient key management protocol for specific application based scenario which enforces secure connectivity of devices and minimizes node capture attacks. There are a number of protocols that have been enforced and implemented for wireless sensor networks (WSN) and internet-enabled devices. We propose a protocol with mobility interface using combinatorial designs for key management in IoT devices. Mobile devices follow a dedicated path to collect data securely from installed devices in the network. We also compare our work with existing protocols and few mobility models. Keywords: IoT
1
· Key predistribution · WSN · Combinatorial design
Introduction
The connectivity of smart and intuitive devices, more popularly known as Internet of Things (IoT) opens exciting range of opportunities. Kevin Ashton (Cofounder of Auto-ID at MIT) proposed term Internet of Things (IoT) in the year 1982 and he termed this “thing” in a conference in 1999. International Telecommunication Unit (ITU) and European Research Cluster on the Internet of Things (IERC) [1] officially defined as “Things” are active participants in business, information and social processes where they are enabled to interact and communicate among themselves and with the environment by exchanging data and information sensed about the environment, while reacting autonomously to the real/physical world events and influencing it by running processes that trigger actions and create services with or without direct human intervention. 1.1
IoT and Security
IoT constitutes of items that forms a system, and it encompasses sensors within the system formed, are connected to the Internet via wireless and wired Internet connections. These connections can be of type RFID, Wireless Fidelity, Bluetooth, Near Field Communication (NFC) and Zigbee to connect in local area. For wide area connection system requires GSM/CDMA, GPRS and 3G/4G/LTE. c Springer Nature Singapore Pte Ltd. 2016 P. Mueller et al. (Eds.): SSCC 2016, CCIS 625, pp. 161–172, 2016. DOI: 10.1007/978-981-10-2738-3 14
162
S. Saurabh et al.
The sole purpose of IoT is to communicate & connect machine-to-machine, machine-to-man, and man-to-man. In short we can say that, IoT as smart things are combination of Sensors & actuators, connectivity and people & processes. IoT also comes with a vision that individual objects of everyday life can measure, track and analyze useful information about environment. It provides convenience for identification, management and control. There are wide range of applications that IoT provides across private and public areas that includes healthcare, production of goods and their transportation, oil/gas, military applications, etc. As IoT aims to be present in a ubiquitous manner, there is increase in the level of communication and the exchange of data. IoT, fusion of technologies like WSN, Bluetooth, mobile communication network not only involves existing problems of security
Data Loading...