Lightweight Key Management for Adaptive Addressing in Next Generation Internet

The continuous evolution of Next Generation Internet NGI amplifies the demand for efficient and secure communication capable of responding effectively to the challenges posed by the emerging applications. For secure communication between two sensor nodes, a secret key is needed. Cryptographic key management is a challenging task in sensor networks as the hostile environment of sensor networks makes it more prone to attacks. Apart from resource constraints of the devices, unknown topology of the network, the higher risk of node capture and lack of a fixed infrastructure makes the key management more challenging in Wireless Sensor Network WSN. Paper surveys different key Management schemes for WSN. The paper presents the efficiency versus security requirements tradeoffs in key management for WSN. Paper also proposes a novel key management protocol which provides strong resistance against replay attacks. The results obtained from the mathematical model based on conditional probability of the scheme suggest that the proposed key management in NGI is efficient and attack resistant.

[1]  Nilanjan Dey,et al.  A Real Time Dactylology Based Feature Extractrion for Selective Image Encryption and Artificial Neural Network , 2016 .

[2]  Rung Ching Chen,et al.  Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[3]  Poonam N. Railkar,et al.  Identity Management for Internet of Things , 2015 .

[4]  Pardeep Kumar,et al.  An efficient key pre-distribution scheme for wireless sensor network using public key cryptography , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[5]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[6]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[7]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[8]  Satish Kumar,et al.  Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks , 2013, Int. J. Ambient Comput. Intell..

[9]  Yu-Kwong Kwok,et al.  A Novel Key Redistribution Scheme for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[10]  Vipin Jain,et al.  A novel symmetric key encryption technique using Cellular Automata , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[11]  Kefei Chen,et al.  A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks , 2009, WISM.

[12]  Liwen Zhang,et al.  A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010 .

[13]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[14]  Azeddine Bilami,et al.  Compressed and distributed host identity protocol for end-to-end security in the IoT , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).

[15]  Nilanjan Dey,et al.  Symmetric Key Encryption Technique , 2016 .

[16]  D. G. Chandra,et al.  A Comparative Study on IPv4 and IPv6 , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[17]  Chen Kefei,et al.  A Reliable Pairwise Key-Updating Scheme for Sensor Networks , 2007 .

[18]  Yong Wang,et al.  An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks , 2010, Wirel. Sens. Netw..

[19]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[20]  Mohammad Umar Siddiqi,et al.  Cryptographically Generated Addresses (CGAs): A survey andan analysis of performance for use in mobile environment , 2011 .

[21]  Xu Li,et al.  A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[22]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[23]  Pekka Nikander,et al.  Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.

[24]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..