Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects | Wireless Personal Communications Skip to main content
Log in

Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The fast evolution in microelectronics and the emergence of wireless communication technologies, have allowed the appearance of the promising field of Internet of Things (IoT). The latter is more and more present in the human life, that is why it becomes essential to secure the communications done with the connected objects. Almost all communicating systems attach great importance to security, consequently, on the cryptographic key management. The existing key management schemes for conventional networks are relatively resource-intensive, that is why they are not adequate for resource-constrained networks like IoT, especially since the nodes’ capabilities are heterogeneous. In this paper, we focus on exchanging and updating of cryptographic keys among the IoT objects often limited in resources, where we propose a new form of key exchange based on the mechanism of concealing encryption keys, while exploiting the misused spaces in the header fields of the exchanged packets by the communication standards, such as ZigBee, BLE, WiFi.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. 2TDEA operates under three keys, in which the first and third ones are identical. The conventional size of each key is 56 bits, and hence, the natural total size would be 112 bits. However, as reported in [7], the 2TDEA crypto-system becomes solid starting from a total key size of 80 bits. That’s why we keep the lower configuration of keys in order to square with the requirements imposed by the network, which is quite constrained in terms of resources.

References

  1. Aissani, S., Fettioune, T., Maizia, N., Mohammedi, M., & Omar, M. (2018). Overheadless key exchange mechanism for heterogeneous connected objects. In The 7th international symposium ISKO-Maghreb on knowledge organization in the perspective of digital humanities: Research and application (pp. 90–97).

  2. Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.

    Article  Google Scholar 

  3. Aissani, S., & Abbache, B. (2020). Secure key management system integrated in cell-LEACH. Wireless Personal Communications, 112(4), 2109–2129.

    Article  Google Scholar 

  4. Bi, J. N., & Xu, E. (2013). An energy-efficient security node-based key management protocol for WSN. Instruments, Measurement, Electronics and Information Engineering, series: Applied Mechanics and Materials, editor: Trans Tech Publications., 347(350), 2117–2121.

    Google Scholar 

  5. Billet, B. (2015). Systéme de gestion de flux pour l’Internet des Objets intelligents. Calcul paralléle, distribué et partagé [cs.DC]. Université de Versailles-Saint Quentin en Yvelines, \(\langle NNT:2015VERS012V \rangle\). \(\langle tel-01166047 \rangle\), 2015.

  6. Burrows, M., Abadi, M., & Needham, R. A. (1990). logic of authentication. Journal ACM Transactions on Computer Systems, 8(1), 18–36.

    Article  Google Scholar 

  7. Elaine, B. (2016). Recommendation for key management. NIST Special Publication 800-57 Part 1, https://doi.org/10.6028/NIST.SP.800-57pt1r4.

  8. Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the 33rd Annual Hawaii international conference on system sciences (pp. 3005–3014).

  9. Kim, K. W., Han, Y. H., & Min, S. G. (2017). An authentication and key management mechanism for resource constrained devices in IEEE 802.11-based IoT access networks. Sensors (Basel), 17(10), 1–14.

    Google Scholar 

  10. Présentation de matlab. http://www.samuelboudet.com/fr/matlab. Accessed September 25, 2018.

  11. Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the IEEE wireless communications and networking conference (pp. 2728–2733).

  12. Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2014). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.

    Google Scholar 

  13. Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, A. (2015). Key management protocol with implicit certificates for IoT systems. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, (IoT-Sys.’15) (pp. 37–42).

  14. Suganthi, N., & Sumathy, V. (2014). Energy efficient key management scheme for wireless sensor networks. International Journal of Computers Communications & Control, 9(1), 71–78.

    Article  Google Scholar 

  15. Zhang, Y., & Pengfei, J. (2014). An efficient and hybrid key management for heterogeneous wireless sensor networks. In Proceedings of the 26th Chinese control and decision conference (pp. 1881–1885).

  16. Zhang, X., He, J., & Wei, Q. (2010). EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1–11.

Download references

Acknowledgements

This work has been sponsored by General Directorate for Scientific Research and Technological Development, Ministry of Higher Education and Scientific Research (DGRSDT), Algeria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sofiane Aissani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aissani, S., Fettioune, T., Maizia, N. et al. Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects. Wireless Pers Commun 120, 2631–2652 (2021). https://doi.org/10.1007/s11277-021-08549-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08549-2

Keywords

Navigation