A WSN-Oriented Key Agreement Protocol in Internet of Things

Article Preview

Abstract:

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1792-1795

Citation:

Online since:

September 2013

Export:

Price:

[1] A. Sarma,J. girao, Identities in the Future Internet of Things, Wireless Personal Communications, Volume 49/2009, Springer Netherlands, (2009).

Google Scholar

[2] YANG G, GENG G N, DU J, etc. Security threats and measures for the Internet of Things, J Tsinghua Univ (Sci & Tech), 2011, 51(10): 1335-1340.

Google Scholar

[3] FAN Y J, CHEN H, ZHANG X Y, Data Privacy Preservation in Wireless Sensor Networks. Chinese Journal of Computers, 2012, 35(6): 1131-1146.

DOI: 10.3724/sp.j.1016.2012.01131

Google Scholar

[4] Eschenauer L, Gligor V. A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2002. 41-47.

DOI: 10.1145/586110.586117

Google Scholar

[5] Du W L,Deng J, Han Y S, and Varshney P K, A pairwise key pre-distribution scheme for wireless sensor network. In: Proc 10th ACM Conf on Computer and Communications Security(CSS), Washington, DC. 2003, 42-51.

DOI: 10.1145/948109.948118

Google Scholar

[6] Leonardo B. Oliveira, Ricardo Dahab, Julio Lopez et al. , Identity-Based Encryption for Sensor Networks, In Pervasive Computing and Communications Workshops, 2007. Fifth Annual IEEE International Conference, New York, USA: IEEE Press, 2007: 290-294.

DOI: 10.1109/percomw.2007.56

Google Scholar

[7] ZHANG J W, ZHANG L W. Key management scheme for heterogeneous wireless sensor networks using identity-based cryptography, Computer Engineering and Applications,  2011, 47(5): 7-9, 20.

Google Scholar

[8] ZHANG M Q, FU W H, WU X G. Key management scheme based on composite design and identity encryption for clustered wireless sensor networks, Journal of Computer Applications, 2012, 32(5): 1392-1396.

DOI: 10.3724/sp.j.1087.2012.01392

Google Scholar

[9] Saurabh Ganeriwal, Mani B. Srivastava, Reputation-based framework for high integrity sensor networks, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, 2004: 66-77.

DOI: 10.1145/1029102.1029115

Google Scholar