2019
DOI: 10.3390/computers8010027
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

Abstract: This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…The WSN protocol architecture is designed to be energy efficient and meet application needs. There are two types of data collection protocols now in use: hierarchical protocols and non-hierarchical protocols [15]. The attraction of a non-hierarchical collection of protocol modules over a completely vertically stacked design, which is common in several other groups of communication systems, is that events transmitted through one layer (module) do not need to be analyzed with an intermediary layer.…”
Section: Wsns Architecture Overviewmentioning
confidence: 99%
“…The WSN protocol architecture is designed to be energy efficient and meet application needs. There are two types of data collection protocols now in use: hierarchical protocols and non-hierarchical protocols [15]. The attraction of a non-hierarchical collection of protocol modules over a completely vertically stacked design, which is common in several other groups of communication systems, is that events transmitted through one layer (module) do not need to be analyzed with an intermediary layer.…”
Section: Wsns Architecture Overviewmentioning
confidence: 99%
“…A recent example is the scheme of Amin et al [6], which presents a lightweight key agreement protocol for IoT devices in a distributed cloud environment, where the user equipped with an IoT device, service provider and control server achieve mutual authentication, resulting in a common shared session key between user and service provider. In [14] a symmetric key based protocol for multicast communication in wireless sensor networks has been proposed, where one of the nodes take the role of cluster manager and is responsible for the key management. Another example is the key management and user authentication scheme proposed by Wazid et al [46].…”
Section: Related Workmentioning
confidence: 99%
“…The setting, mostly related to fog architecture, corresponds to the one of non-hierarchical or distributed networks, where one of the nodes takes the role of group leader. Here, we can distinguish the following schemes [29]- [33]. In [29], a symmetric key based scheme has been proposed in which a cloud server appoints one of the members of the WSN as group leader and shares the required key material with it.…”
Section: B Wireless Sensor Networkmentioning
confidence: 99%
“…Here, we can distinguish the following schemes [29]- [33]. In [29], a symmetric key based scheme has been proposed in which a cloud server appoints one of the members of the WSN as group leader and shares the required key material with it. Another symmetric key based solution is proposed in [30], for which a robot-assisted network bootstrapping technique is put forward.…”
Section: B Wireless Sensor Networkmentioning
confidence: 99%