Affiliation:
1. School of Information Science and Engineering, Linyi University, Linyi, Shandong 276005, China
Abstract
This study is aimed at the authentication problem between the node’s public key and the node in the sensor network of the Internet of Things(IoT). As well as the sensor node key distribution needs to verify trusted nodes, resulting in a lot of storage and computational overhead problems. A routing-driven key management scheme for the IoT based on identification certificate authentication system is proposed. The scheme takes the identification key pair of the node as the verification key to verify the random key pair generated by the node to ensure that the whole process does not need the intervention of a trusted third party; random key pairs are generated by nodes independently to ensure that each sensor node has different keys. When a node is broken, it will not cause damage to other nodes. At the same time, the shared key is only established for adjacent sensor nodes that communicate with each other to ensure the security and lightweight storage overhead of the sensor nodes. The experimental analysis shows that the scheme can provide better security, can effectively reduce sensor nodes’ storage space and energy consumption, and has higher advantages in safety and performance.
Funder
Key Research and Development Program of Shandong Province
Subject
Computer Networks and Communications,Information Systems
Reference27 articles.
1. Notice of the general office of the ministry of industry and information technology on deepening the all-round development of mobile Internet of things [EB/OL];General Office of Ministry of Industry and Information Technology,2020
2. Insider attacks on multi factor authentication protocol in wireless sensor networks;W. Li;Journal of Software,2019
3. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
4. Group and hierarchical key management for secure communications in internet of things
5. A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks