Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro

With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantly. IoT is built on sensor networks, which are enabling a new variety of solutions for applications in several fields (health, industry, defense, agrifood and agro sectors, etc.). Wireless communications are indispensable for taking full advantage of sensor networks but implies new requirements in the security and privacy of communications. Security in wireless sensor networks (WSNs) is a major challenge for extending IoT applications, in particular those related to the smart-agro. Moreover, limitations on processing capabilities of sensor nodes, and power consumption have made the encryption techniques devised for conventional networks not feasible. In such scenario, symmetric-key ciphers are preferred for key management in WSN; key distribution is therefore an issue. In this work, we provide a concrete implementation of a novel scalable group distributed key management method and a protocol for securing communications in IoT systems used in the smart agro sector, based on elliptic curve cryptography, to ensure that information exchange between layers of the IoT framework is not affected by sensor faults or intentional attacks. In this sense, each sensor node executes an initial key agreement, which is done through every member’s public information in just two rounds and uses some authenticating information that avoids external intrusions. Further rekeying operations require just a single message and provide backward and forward security.

[1]  Jaime Lloret,et al.  IoT-Based Smart Irrigation Systems: An Overview on the Recent Trends on Sensors and IoT Systems for Irrigation in Precision Agriculture , 2020, Sensors.

[2]  Joachim Rosenthal,et al.  An Active Attack on a Multiparty Key Exchange Protocol , 2015, ArXiv.

[3]  Gene Tsudik,et al.  New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.

[4]  Somayeh Sardashti,et al.  The gem5 simulator , 2011, CARN.

[5]  Azlan Awang,et al.  Error-Aware Data Clustering for In-Network Data Reduction in Wireless Sensor Networks , 2020, Sensors.

[6]  Bedir Tekinerdogan,et al.  Architecture framework of IoT-based food and farm systems: A multiple case study , 2019, Comput. Electron. Agric..

[7]  Carlos Pedrinaci,et al.  servIoTicy and iServe: A Scalable Platform for Mining the IoT , 2015, ANT/SEIT.

[8]  Hamid Barati,et al.  Dynamic key management algorithms in wireless sensor networks: A survey , 2019, Comput. Commun..

[9]  Joachim Rosenthal,et al.  An application of group theory in confidential network communications , 2016, ArXiv.

[10]  Sanmeet Kaur,et al.  Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture , 2019, Comput. Electron. Agric..

[11]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Whitfield Diffie,et al.  A Secure Audio Teleconference System , 1988, CRYPTO.

[14]  Chien-Chung Shen,et al.  Sensor information networking architecture and applications , 2001, IEEE Wirel. Commun..

[15]  Francisco Javier Ferrández Pastor,et al.  Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture , 2016, Sensors.