Recent Advances in Computer Science and Communications

Author(s): C. Tamizhselvan* and V. Vijayalakshmi

DOI: 10.2174/2666255813999200928220535

Distributed Time-Dependent Key Management Scheme for Internet of Things

Article ID: e111022186368 Pages: 5

  • * (Excluding Mailing and Handling)

Abstract

The Internet of Things (IoT) faces a variety of challenges and issues in administering security due to its heterogeneous nature and open communication medium. The fundamental security requirement of authentication is expected to secure the communication between the devices from anonymous access. In this article, we present a Distributed Time-Dependent Key Management (DTKM) technique for securing the communication sessions of the IoT devices. This key management technique considers the communication time and interval of the devices independently to generate session keys for authentication. Key management is preceded by the consideration of request authentication and resource utilization. Based on the communication time session, the validity of the keys is determined and is updated with the current random number consideration for authentication. This helps to prevent unnecessary exploitation of storage and also reduces computation time.

Keywords: Distributed security, IoT, key management, message authentication, session key, cloud, security Server.

Graphical Abstract

[1]
S. Mubeen, S.A. Asadollah, A.V. Papadopoulos, M. Ashjaei, H. Pei-Breivold, and M. Behnam, "Management of service level agreements for cloud services in iot: A systematic mapping study", IEEE Access, vol. 6, pp. 30184-30207, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2744677]
[2]
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: A survey on enabling technologies, protocols, and applications", IEEE Comm. Surv. and Tutor., vol. 17, no. 4, pp. 2347-2376, 2015.
[http://dx.doi.org/10.1109/COMST.2015.2444095]
[3]
S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi, "Key management protocol with implicit certificates for IoT systems",
[http://dx.doi.org/10.1145/2753476.2753477]
[4]
J. Zhou, Z. Cao, X. Dong, and A.V. Vasilakos, "Security and privacy for cloud-based IoT: challenges", IEEE Commun. Mag., vol. 55, no. 1, pp. 26-33, 2017.
[http://dx.doi.org/10.1109/MCOM.2017.1600363CM]
[5]
C. Shi, J. Liu, H. Liu, and Y. Chen, "Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT", Proceedings of ACM international symposium on mobile ad hoc networking and computing (MobiHoc), 2017pp. 1-10 Chennai, India
[http://dx.doi.org/10.1145/3084041.3084061]
[6]
J. Delvaux, D. Gu, D. Schellekens, and I. Verbauwhede, "Helper data algorithms for PUF-based key generation: Overview and analysis", IEEE Trans. Comput. Aided Des. Integrated Circ. Syst., vol. 34, no. 6, pp. 889-902, 2014.
[http://dx.doi.org/10.1109/TCAD.2014.2370531]
[7]
D. Mukhopadhyay, PUFs as promising tools for security in Internet of things., IEEE Design Test, vol. 33. 2016, no. 3, pp. 103-115.
[http://dx.doi.org/10.1109/MDAT.2016.2544845]
[8]
M. Huang, B. Yu, and S. Li, PUF-assisted Group Key Distribution Scheme for Software-Defined Wireless Sensor Networks, IEEE Commun. Lett., 2017.
[9]
I-C. Tsai, Rim Int. Symp. Depend. Comput. (PRDC), 2017pp. 118-124
[10]
L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, "A novel batch-based group key management protocol applied to the Internet of Things", Ad Hoc Netw., vol. 11, no. 8, pp. 2724-2737, 2013.
[http://dx.doi.org/10.1016/j.adhoc.2013.05.009]
[11]
P. Porambage, A. Braeken, C. Schmitt, A. Gurtov, M. Ylianttila, and B. Stiller, "Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications", IEEE Access, vol. 3, pp. 1503-151, 2015.
[http://dx.doi.org/10.1109/ACCESS.2015.2474705]