Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

15.03.2019 | Ausgabe 4/2020

Wireless Networks 4/2020

TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks

Zeitschrift:
Wireless Networks > Ausgabe 4/2020
Autoren:
Anshul Anand, Mauro Conti, Pallavi Kaliyar, Chhagan Lal
Wichtige Hinweise

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Abstract

Internet of Things (IoT) employs a large number of sensors and actuators to collect and act upon data for its smart functionalities. These devices are considered as a part of the Low-power and Lossy Networks due to their use of low power embedded hardware and computationally constrained nature. For synchronization and utility, these devices are often clubbed together logically to form groups. To maintain data confidentiality within a group, a shared symmetric key called the Group Key (GK) is used by all the group members. The GK must be redistributed upon joining and leaving of a group member to maintain forward and backward secrecy. However, the key management (i.e., generation and distribution) process causes overhead which consumes the scarce network resources. In this paper, we propose TARE, a novel Topology Adaptive Re-kEying (TARE) scheme for lightweight and secure group communication. TARE integrates the principles of routing tree mapped logical key tree and local derivation of the key over the an IPv6 Routing Protocol for low-power and Lossy networks in an original way. TARE takes into consideration the current routing topology and makes maximum energy reduction as the premise for its choice of key derivation and distribution methods, thus, it reduces the network energy consumption while maintaining key secrecy and data confidentiality. In particular, TARE provides the following advantages: (1) lower network overhead and bandwidth utilization in key management and re-distribution operations, (2) effective against the network mobility in scalable IoT networks, (3) secure group communications in network against attacks such as man-in-the-middle and eavesdropping, and (4) data confidentiality by ensuring backward and forward secrecy in key distribution method. We evaluate the performance of TARE and compare it with existing schemes. Our results show the effectiveness of TARE regarding energy consumption, bandwidth utilization, and the number of encrypted message transmissions during the re-keying operations.

Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Maschinenbau + Werkstoffe




Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Testen Sie jetzt 30 Tage kostenlos.

Literatur
Über diesen Artikel

Weitere Artikel der Ausgabe 4/2020

Wireless Networks 4/2020 Zur Ausgabe