Abstract
The fast evolution in microelectronics and the emergence of wireless communication technologies, have allowed the appearance of the promising field of Internet of Things (IoT). The latter is more and more present in the human life, that is why it becomes essential to secure the communications done with the connected objects. Almost all communicating systems attach great importance to security, consequently, on the cryptographic key management. The existing key management schemes for conventional networks are relatively resource-intensive, that is why they are not adequate for resource-constrained networks like IoT, especially since the nodes’ capabilities are heterogeneous. In this paper, we focus on exchanging and updating of cryptographic keys among the IoT objects often limited in resources, where we propose a new form of key exchange based on the mechanism of concealing encryption keys, while exploiting the misused spaces in the header fields of the exchanged packets by the communication standards, such as ZigBee, BLE, WiFi.
Similar content being viewed by others
Notes
2TDEA operates under three keys, in which the first and third ones are identical. The conventional size of each key is 56 bits, and hence, the natural total size would be 112 bits. However, as reported in [7], the 2TDEA crypto-system becomes solid starting from a total key size of 80 bits. That’s why we keep the lower configuration of keys in order to square with the requirements imposed by the network, which is quite constrained in terms of resources.
References
Aissani, S., Fettioune, T., Maizia, N., Mohammedi, M., & Omar, M. (2018). Overheadless key exchange mechanism for heterogeneous connected objects. In The 7th international symposium ISKO-Maghreb on knowledge organization in the perspective of digital humanities: Research and application (pp. 90–97).
Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.
Aissani, S., & Abbache, B. (2020). Secure key management system integrated in cell-LEACH. Wireless Personal Communications, 112(4), 2109–2129.
Bi, J. N., & Xu, E. (2013). An energy-efficient security node-based key management protocol for WSN. Instruments, Measurement, Electronics and Information Engineering, series: Applied Mechanics and Materials, editor: Trans Tech Publications., 347(350), 2117–2121.
Billet, B. (2015). Systéme de gestion de flux pour l’Internet des Objets intelligents. Calcul paralléle, distribué et partagé [cs.DC]. Université de Versailles-Saint Quentin en Yvelines, \(\langle NNT:2015VERS012V \rangle\). \(\langle tel-01166047 \rangle\), 2015.
Burrows, M., Abadi, M., & Needham, R. A. (1990). logic of authentication. Journal ACM Transactions on Computer Systems, 8(1), 18–36.
Elaine, B. (2016). Recommendation for key management. NIST Special Publication 800-57 Part 1, https://doi.org/10.6028/NIST.SP.800-57pt1r4.
Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the 33rd Annual Hawaii international conference on system sciences (pp. 3005–3014).
Kim, K. W., Han, Y. H., & Min, S. G. (2017). An authentication and key management mechanism for resource constrained devices in IEEE 802.11-based IoT access networks. Sensors (Basel), 17(10), 1–14.
Présentation de matlab. http://www.samuelboudet.com/fr/matlab. Accessed September 25, 2018.
Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the IEEE wireless communications and networking conference (pp. 2728–2733).
Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2014). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.
Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, A. (2015). Key management protocol with implicit certificates for IoT systems. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, (IoT-Sys.’15) (pp. 37–42).
Suganthi, N., & Sumathy, V. (2014). Energy efficient key management scheme for wireless sensor networks. International Journal of Computers Communications & Control, 9(1), 71–78.
Zhang, Y., & Pengfei, J. (2014). An efficient and hybrid key management for heterogeneous wireless sensor networks. In Proceedings of the 26th Chinese control and decision conference (pp. 1881–1885).
Zhang, X., He, J., & Wei, Q. (2010). EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1–11.
Acknowledgements
This work has been sponsored by General Directorate for Scientific Research and Technological Development, Ministry of Higher Education and Scientific Research (DGRSDT), Algeria.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Aissani, S., Fettioune, T., Maizia, N. et al. Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects. Wireless Pers Commun 120, 2631–2652 (2021). https://doi.org/10.1007/s11277-021-08549-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08549-2