QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things

被引:12
作者
Ren, Wei [1 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
关键词
HOME; STANDARDS; NETWORKS;
D O I
10.1002/nem.794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IOT) is envisioned as a natural evolution of the Internet, promising to enable ubiquitous connections for pervasive objects. The evolutionary merging of heterogeneous wireless networks is inevitable for smooth migration to IOT; for example, in a typical application of IOT-smart homes-there exist sensor-radio frequency identification (RFID) hybrid networks. The communication security between sensor (or RFID tags) and home control center is critical, whereas an appropriate key management scheme is a prerequisite for communication security. In this paper, we propose a compromise resilient key management scheme including key agreement schemes and key evolution policies to tackle existing remarkable asymmetry with respect to computation resources of hybrid networks. In particular, a forward and backward secure key evolution policy with formal proof is proposed. We also propose a quality of service (QoS)-aware enhancement method by measuring several metrics such as data assurance priority, attacking risk, and remaining power percentage. Security parameter negotiation and a tuning method are proposed, based on reactive measurement in real time. Our proposed scheme is built on abstract cryptographic primitives such as trapdoor permutation, pseudorandom function, pseudorandom number generator, one-way function and hash function so as to retain flexibility for concrete options. Security and performance for proposed key agreement schemes and key evolution policies are compared in detail. Three QoS-aware security strategies are proposed: performance first, security second (PFSS); security first, performance second (SFPS); and performance security made balanced (PSMB). Measurement-based negotiation of security parameters is also proposed in terms of algorithm prototype. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:284 / 299
页数:16
相关论文
共 24 条
  • [11] Efficient Mobile Sensor Authentication In Smart Home and WPAN
    Han, Kyusuk
    Shon, Taeshik
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (02) : 591 - 596
  • [12] SNAIL: AN IP-BASED WIRELESS SENSOR NETWORK APPROACH TO THE INTERNET OF THINGS
    Hong, Sungmin
    Kim, Daeyoung
    Ha, Minkeun
    Bae, Sungho
    Park, Sang Jun
    Jung, Woo-Young
    Kim, Jae-Eon
    [J]. IEEE WIRELESS COMMUNICATIONS, 2010, 17 (06) : 34 - 42
  • [13] Enhanced Self-Configuration Scheme for a Robust ZigBee-based Home Automation
    Hwang, Kwang-il
    Choi, Byoung-Jo
    Kang, Seok-hoon
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (02) : 583 - 590
  • [14] Smart Objects as Building Blocks for the Internet of Things
    Kortuem, Gerd
    Kawsar, Fahim
    Fitton, Daniel
    Sundramoorthy, Vasughi
    [J]. IEEE INTERNET COMPUTING, 2010, 14 (01) : 44 - 51
  • [15] Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things
    Koshizuka, Noboru
    Sakamura, Ken
    [J]. IEEE PERVASIVE COMPUTING, 2010, 9 (04) : 98 - 101
  • [16] Embedded Interaction Interacting with the Internet of Things
    Kranz, Matthias
    Holleis, Paul
    Schmidt, Albrecht
    [J]. IEEE INTERNET COMPUTING, 2010, 14 (02) : 46 - 53
  • [17] Service management in secure and QoS-aware wireless enterprise networks
    Limam, N
    Rotrou, J
    Loutrel, M
    Ouakil, L
    Saleh, H
    Pujolle, G
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) : 1950 - 1962
  • [18] GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications
    Lu, Rongxing
    Li, Xu
    Liang, Xiaohui
    Shen, Xuemin
    Lin, Xiaodong
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (04) : 28 - 35
  • [19] What Can the Internet of Things Do for the Citizen? Workshop at Pervasive 2010
    Michahelles, Florian
    Karpischek, Stephan
    Schmidt, Albrecht
    [J]. IEEE PERVASIVE COMPUTING, 2010, 9 (04) : 102 - 104
  • [20] Qi F, 2009, IEEE 6 INT C MOB ADH, P842