Affiliation:
1. School of Computing and Mathematics, Charles Sturt University, Australia
2. Charles Sturt University, Sydney, Australia
Abstract
To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.
Reference34 articles.
1. Optimised clustering algorithm-based centralised architecture for load balancing in IoT network
2. Amrita, M. C., & Renold, P. A. (2014). Routing protocol for low power lossy networks. In Proceedings of the 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies. IEEE.
3. Anand, H., & Varaprasad, G. (2012). Dynamic key management method for wireless sensor networks. In Proceedings of the 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN) (pp. 1–5). Academic Press.
4. A novel approach for secure and fast generation of RSA public and private keys on SmartCard
5. CoAP: An Application Protocol for Billions of Tiny Internet Nodes
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献