Skip to main content
Top
Published in: Wireless Personal Communications 4/2021

10-05-2021

Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects

Authors: Sofiane Aissani, Tarek Fettioune, Nafaa Maizia, Mohamed Mohammedi, Mawloud Omar

Published in: Wireless Personal Communications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The fast evolution in microelectronics and the emergence of wireless communication technologies, have allowed the appearance of the promising field of Internet of Things (IoT). The latter is more and more present in the human life, that is why it becomes essential to secure the communications done with the connected objects. Almost all communicating systems attach great importance to security, consequently, on the cryptographic key management. The existing key management schemes for conventional networks are relatively resource-intensive, that is why they are not adequate for resource-constrained networks like IoT, especially since the nodes’ capabilities are heterogeneous. In this paper, we focus on exchanging and updating of cryptographic keys among the IoT objects often limited in resources, where we propose a new form of key exchange based on the mechanism of concealing encryption keys, while exploiting the misused spaces in the header fields of the exchanged packets by the communication standards, such as ZigBee, BLE, WiFi.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
2TDEA operates under three keys, in which the first and third ones are identical. The conventional size of each key is 56 bits, and hence, the natural total size would be 112 bits. However, as reported in [7], the 2TDEA crypto-system becomes solid starting from a total key size of 80 bits. That’s why we keep the lower configuration of keys in order to square with the requirements imposed by the network, which is quite constrained in terms of resources.
 
Literature
1.
go back to reference Aissani, S., Fettioune, T., Maizia, N., Mohammedi, M., & Omar, M. (2018). Overheadless key exchange mechanism for heterogeneous connected objects. In The 7th international symposium ISKO-Maghreb on knowledge organization in the perspective of digital humanities: Research and application (pp. 90–97). Aissani, S., Fettioune, T., Maizia, N., Mohammedi, M., & Omar, M. (2018). Overheadless key exchange mechanism for heterogeneous connected objects. In The 7th international symposium ISKO-Maghreb on knowledge organization in the perspective of digital humanities: Research and application (pp. 90–97).
2.
go back to reference Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.CrossRef Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.CrossRef
3.
go back to reference Aissani, S., & Abbache, B. (2020). Secure key management system integrated in cell-LEACH. Wireless Personal Communications, 112(4), 2109–2129.CrossRef Aissani, S., & Abbache, B. (2020). Secure key management system integrated in cell-LEACH. Wireless Personal Communications, 112(4), 2109–2129.CrossRef
4.
go back to reference Bi, J. N., & Xu, E. (2013). An energy-efficient security node-based key management protocol for WSN. Instruments, Measurement, Electronics and Information Engineering, series: Applied Mechanics and Materials, editor: Trans Tech Publications., 347(350), 2117–2121. Bi, J. N., & Xu, E. (2013). An energy-efficient security node-based key management protocol for WSN. Instruments, Measurement, Electronics and Information Engineering, series: Applied Mechanics and Materials, editor: Trans Tech Publications., 347(350), 2117–2121.
5.
go back to reference Billet, B. (2015). Systéme de gestion de flux pour l’Internet des Objets intelligents. Calcul paralléle, distribué et partagé [cs.DC]. Université de Versailles-Saint Quentin en Yvelines, \(\langle NNT:2015VERS012V \rangle\). \(\langle tel-01166047 \rangle\), 2015. Billet, B. (2015). Systéme de gestion de flux pour l’Internet des Objets intelligents. Calcul paralléle, distribué et partagé [cs.DC]. Université de Versailles-Saint Quentin en Yvelines, \(\langle NNT:2015VERS012V \rangle\). \(\langle tel-01166047 \rangle\), 2015.
6.
go back to reference Burrows, M., Abadi, M., & Needham, R. A. (1990). logic of authentication. Journal ACM Transactions on Computer Systems, 8(1), 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. A. (1990). logic of authentication. Journal ACM Transactions on Computer Systems, 8(1), 18–36.CrossRef
8.
go back to reference Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the 33rd Annual Hawaii international conference on system sciences (pp. 3005–3014). Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the 33rd Annual Hawaii international conference on system sciences (pp. 3005–3014).
9.
go back to reference Kim, K. W., Han, Y. H., & Min, S. G. (2017). An authentication and key management mechanism for resource constrained devices in IEEE 802.11-based IoT access networks. Sensors (Basel), 17(10), 1–14. Kim, K. W., Han, Y. H., & Min, S. G. (2017). An authentication and key management mechanism for resource constrained devices in IEEE 802.11-based IoT access networks. Sensors (Basel), 17(10), 1–14.
11.
go back to reference Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the IEEE wireless communications and networking conference (pp. 2728–2733). Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the IEEE wireless communications and networking conference (pp. 2728–2733).
12.
go back to reference Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2014). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383. Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2014). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.
13.
go back to reference Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, A. (2015). Key management protocol with implicit certificates for IoT systems. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, (IoT-Sys.’15) (pp. 37–42). Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, A. (2015). Key management protocol with implicit certificates for IoT systems. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, (IoT-Sys.’15) (pp. 37–42).
14.
go back to reference Suganthi, N., & Sumathy, V. (2014). Energy efficient key management scheme for wireless sensor networks. International Journal of Computers Communications & Control, 9(1), 71–78.CrossRef Suganthi, N., & Sumathy, V. (2014). Energy efficient key management scheme for wireless sensor networks. International Journal of Computers Communications & Control, 9(1), 71–78.CrossRef
15.
go back to reference Zhang, Y., & Pengfei, J. (2014). An efficient and hybrid key management for heterogeneous wireless sensor networks. In Proceedings of the 26th Chinese control and decision conference (pp. 1881–1885). Zhang, Y., & Pengfei, J. (2014). An efficient and hybrid key management for heterogeneous wireless sensor networks. In Proceedings of the 26th Chinese control and decision conference (pp. 1881–1885).
16.
go back to reference Zhang, X., He, J., & Wei, Q. (2010). EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1–11. Zhang, X., He, J., & Wei, Q. (2010). EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1–11.
Metadata
Title
Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects
Authors
Sofiane Aissani
Tarek Fettioune
Nafaa Maizia
Mohamed Mohammedi
Mawloud Omar
Publication date
10-05-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08549-2

Other articles of this Issue 4/2021

Wireless Personal Communications 4/2021 Go to the issue