A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things

Internet of things (IoT) can enable cyber-physical objects to communicate with one another and realize real-time living-needs control such as for vehicles, smart phones, refrigerators, healthcare gadgets and air-conditioners. Of the applications of IoT, collecting and receiving health-related data securely is the most crucial and significant use in the fields of community and hospital healthcare, where any single communication failure or data loss might cause a life damage risk. To address this problem, self-healing mechanism can be used for facilitating secure communications and recovering from the lost data. In this paper, a new key distribution with self-healing for IoT objects of community healthcare is proposed, and the underlying system is composed of two layers. In the top layer, the new scheme implements both deterministic security link and access control which are based on polynomial-based methods. In the bottom layer, we propose a trust-based key distribution scheme with self-healing and a singular value decomposition (SVD) based authentication method. Security and performance analysis show that our protocol can be performed more efficiently in data communication. In addition, results obtained from both security analysis and simulations indicate that our scheme is more suitable for IoT networks.

[1]  Wen-Tsai Sung,et al.  Evidence-based multi-sensor information fusion for remote health care systems , 2013 .

[2]  Sourav Mukhopadhyay,et al.  Generalized Self-healing Key Distribution Using Vector Space Access Structure , 2008, Networking.

[3]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[4]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[5]  Germán Sáez On Threshold Self-healing Key Distribution Schemes , 2005, IMACC.

[6]  Tomasz Rams,et al.  A Survey of Group Key Distribution Schemes With Self-Healing Property , 2013, IEEE Communications Surveys & Tutorials.

[7]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[8]  Karl Aberer,et al.  Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems , 2013, IEEE Trans. Inf. Forensics Secur..

[9]  Chao Yang,et al.  Quantum key distribution network: Optimal secret-key-aware routing method for trust relaying , 2018, China Communications.

[10]  Fadi Al-Turjman,et al.  A Novel Security Model for Cooperative Virtual Networks in the IoT Era , 2018, International Journal of Parallel Programming.

[11]  Choong Seon Hong,et al.  A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks , 2006, ICDCIT.

[12]  Jun Luo,et al.  A logic-route key tree based group key management scheme for wireless sensor networks , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).

[13]  Theodore B. Zahariadis,et al.  A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[14]  Huifang Chen,et al.  One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks , 2013, Ad Hoc Networks.

[15]  Hee Yong Youn,et al.  A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks , 2005, CIS.

[16]  V. S. Janani,et al.  An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks , 2019, Wirel. Pers. Commun..

[17]  Ying Wang,et al.  An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..

[18]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[19]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[20]  Fadi Al-Turjman,et al.  An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..

[21]  Shan Zhong,et al.  An IPv6 address configuration scheme for wireless sensor networks based on location information , 2012, Telecommun. Syst..

[22]  Tomasz Rams,et al.  Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy , 2013, 2013 Conference on Networked Systems.

[23]  Yang Bo,et al.  Mutual authentication and key distribution protocol based on the Trust-Third-Party in mobile RFID environment , 2018, 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA).

[24]  T. J. Swamy,et al.  Link evaluation of uniform grid based wireless sensor networks to base station with leveling and clustering , 2013, 2013 International Conference on Computer Communication and Informatics.

[25]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[26]  Sinem Alturjman,et al.  Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.

[27]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[28]  Jiankun Hu,et al.  An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[29]  Muhammad Khurram Khan,et al.  BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme , 2012 .

[30]  Sourav Mukhopadhyay,et al.  Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability , 2007, ISPA.

[31]  Muhammad Bilal,et al.  An Authentication Protocol for Future Sensor Networks , 2017, Sensors.

[32]  Xiaojiang Du,et al.  An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[33]  Jin-Hee Cho,et al.  Trust threshold based public key management in mobile ad hoc networks , 2016, Ad Hoc Networks.

[34]  Rabi N. Mahapatra,et al.  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[35]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[36]  S. Sitharama Iyengar,et al.  TGAR: Trust Dependent Greedy Anti-Void Routing in Wireless Sensor Networks (WSNs) , 2013 .

[37]  Jingsha He,et al.  Enabling end-to-end secure communication between wireless sensor networks and the Internet , 2012, World Wide Web.

[38]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[39]  Jiankun Hu,et al.  A mutual-healing key distribution scheme in wireless sensor networks , 2011, J. Netw. Comput. Appl..

[40]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[41]  Maode Ma,et al.  A collusion-resilient self-healing key distribution scheme for wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[42]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[43]  Reihaneh Safavi-Naini,et al.  A Secure Re-keying Scheme with Key Recovery Property , 2002, ACISP.

[44]  Atsuko Miyaji,et al.  How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[45]  J. Wenny Rahayu,et al.  Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments , 2012, J. Comput. Syst. Sci..

[46]  Ju-Sung Kang,et al.  An efficient key distribution scheme with self-healing property , 2005, IEEE Communications Letters.

[47]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.

[48]  K. J. Ray Liu,et al.  Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes , 2007, IEEE Transactions on Information Forensics and Security.

[49]  Yongquan Cai,et al.  Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid , 2018, Wireless Personal Communications.

[50]  Jiankun Hu,et al.  Self-Healing Key Distribution Schemes for Wireless Networks: A Survey , 2011, Comput. J..

[51]  Sourav Mukhopadhyay,et al.  Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains , 2007, ACNS.