4.5 Article

A robust and efficient vector-based key management scheme for IoT networks

Journal

AD HOC NETWORKS
Volume 149, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.adhoc.2023.103250

Keywords

Internet of Things (IoT); Security; Wireless Sensor Networks (WSNs); Key management

Ask authors/readers for more resources

This paper presents a new key management scheme based on pre-distributed vectors to address security problems in IoT networks. The scheme divides the network into subareas, making it lightweight, scalable, and resilient to attacks. The proposed scheme is more efficient in terms of storage, communications, computation overheads, and energy consumption, and is more resilient against node capture attacks, making it suitable for resource-limited IoT networks.
Information and communication security is a critical concern in the rapid growth of Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key management is essential to address such networks' security problems. In this context, several existing research work focuses on key management solutions, which consider the resource-limitation of IoT devices. However, the weaknesses of these solutions are (1) the lack of protection for sensitive parameters during transmission, (2) security and performance metrics' misbalancing, and (3) the vulnerability to node-compromising attacks. This paper presents a new key management scheme based on pre-distributed vectors to overcome these limits to secure key establishment, refresh, and revocation. Moreover, the network area is divided into subareas, which makes our solution lightweight, flexible, scalable, and resilient to multiple attacks while minimizing communications, computation, and storage overheads on IoT devices. We assess the proposed scheme by using (1) the BAN (Burrows Abadi Needham) formal verification logic, (2) the informal security to demonstrate its resilience against some known attacks, and (3) the performance analysis to prove its correctness. The obtained results show that the proposed scheme is more efficient than other schemes in terms of storage by saving more than 81.84%, communications by 100% during the group-wise key establishment, computation overheads by reducing the number of multiplication operations to 50%, and energy consumption by saving up to 99.99% during the group-wise key establishment phase. Moreover, the results show that our scheme is more resilient against node capture attacks by up to 96.43% during the initialization phase and by more than 9.89% after, making it suitable for use in resource-limited IoT networks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available