The Procedure of Key Distribution in Military IoT Networks

Cryptographic key distribution is a critical stage in the implementation of network security in the Military IoT (MIoT). In MIoT, due to the resource-constrained nature of the nodes, it is important to design a key management protocol with minimum resource overhead. The proposed procedure uses asymmetric and symmetric cryptography and reduces the memory requirement. The efficient Quantis Random Number Generator is used to provide symmetric keys with full entropy. The method of delivering symmetric keys (so-called session keys) to nodes wishing to implement a safety data exchange was presented. During simulation studies of the ZigBee network, the average energy consumption for the coordinator, single router and end node participating in the encryption key distribution process was estimated. Simulation tests for the ZigBee network were prepared and implemented in the Riverbed Modeler environment.

[1]  Vasil Hnatyshin,et al.  The Practical OPNET User Guide for Computer Network Simulation , 2012 .

[2]  James Michaelis,et al.  Leveraging LoRaWAN to Support IoBT in Urban Environments , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).

[3]  Cesare Stefanelli,et al.  Analyzing the applicability of Internet of Things to the battlefield environment , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).

[4]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008 .

[5]  Janusz Furtak,et al.  Security techniques for the WSN link layer within military IoT , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[6]  Jan Chudzikiewicz,et al.  The method for optimal server placement in the hypercube networks , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).

[7]  Ravi Kishore Kodali,et al.  Key management technique for heterogeneous wireless sensor networks , 2013, IEEE 2013 Tencon - Spring.

[8]  Thomas Magedanz,et al.  IoT inter-security domain trust transfer and service dispatch solution , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[9]  Janusz Furtak,et al.  Secured Domain of Sensor Nodes - A New Concept , 2018, I4CS.

[10]  Uttam Ghosh,et al.  Considering security for ZigBee protocol using message authentication code , 2015, 2015 Annual IEEE India Conference (INDICON).

[11]  Maoheng Sun,et al.  Study and Application of Security Based on ZigBee Standard , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[12]  Alan F. Smeaton,et al.  Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..

[13]  Tomasz Malinowski,et al.  The procedure for monitoring and maintaining a network of distributed resources , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[14]  Jan Chudzikiewicz,et al.  On Some Resources Placement Schemes in the 4-Dimensional Soft Degradable Hypercube Processors Network , 2014, DepCoS-RELCOMEX.