Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
SummaryInternet of Things (IoT) networks continue to be deployed and play a crucial role in our daily life. Thus, ensuring their security is of utmost importance. This necessitates the use of cryptographic materials to maintain the confidentiality of exchanged data between IoT devices (or sensor nodes). The key component of these cryptographic materials is the encryption and decryption keys. In resource‐constrained networks like sensor and IoT networks, employing symmetric pairwise keys offers a trade‐off between resource saving and security. However, symmetric cryptosystems suffer from node compromising attacks. In addition, such networks often require the post‐deployment of new IoT devices either periodically or based on specific use cases leading to a multi‐phase IoT networks. So, key establishment is required to secure newly added node communications. This paper presents an adaPtive and rObust Key pre‐distribution (POK) that enables key establishment between deployed nodes. POK enhances the generation and pre‐loading of keys in sensor nodes. The fundamental concept of POK involves pre‐loading newly added IoT or sensor nodes with pairwise keys computed using a hash function and taking into account the expected number of future post‐deployments. Through a comparative analysis with related works, POK minimizes communication overhead, eliminates the need for time synchronization, and offers an energy‐efficient scheme. Furthermore, POK offers a resilience to node compromising attack by the self‐healing property, where compromised nodes have a limited effect on the network, and newly deployed nodes remain unaffected.
SummaryInternet of Things (IoT) networks continue to be deployed and play a crucial role in our daily life. Thus, ensuring their security is of utmost importance. This necessitates the use of cryptographic materials to maintain the confidentiality of exchanged data between IoT devices (or sensor nodes). The key component of these cryptographic materials is the encryption and decryption keys. In resource‐constrained networks like sensor and IoT networks, employing symmetric pairwise keys offers a trade‐off between resource saving and security. However, symmetric cryptosystems suffer from node compromising attacks. In addition, such networks often require the post‐deployment of new IoT devices either periodically or based on specific use cases leading to a multi‐phase IoT networks. So, key establishment is required to secure newly added node communications. This paper presents an adaPtive and rObust Key pre‐distribution (POK) that enables key establishment between deployed nodes. POK enhances the generation and pre‐loading of keys in sensor nodes. The fundamental concept of POK involves pre‐loading newly added IoT or sensor nodes with pairwise keys computed using a hash function and taking into account the expected number of future post‐deployments. Through a comparative analysis with related works, POK minimizes communication overhead, eliminates the need for time synchronization, and offers an energy‐efficient scheme. Furthermore, POK offers a resilience to node compromising attack by the self‐healing property, where compromised nodes have a limited effect on the network, and newly deployed nodes remain unaffected.
Industrial Internet of Things (IIoT) applications consist of resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, and complex structure of the network further make this issue more challenging. To control the information flow in such environments, access control is critical to make collaboration and communication safe. To deal with these challenges, recent studies employ attribute-based access control on top of blockchain technology. However, the attribute-based access control frameworks suffer due to high computational overhead. In this paper, we propose an improved role-based access control framework using hyperledger blockchain to deal with IIoT requirements with less computational overhead making the information control process more efficient and real-time. The proposed framework leverages a layered architecture of chaincodes to implement the improved access control framework that handles the permission delegation and conflict management to deal with the dynamism of the IIoT network. The system uses a Policy Contract, Device Contract, and Access Contract to manage the workflow of the whole access control process. Each chaincode in the proposed framework is isolated in terms of its responsibilities to make the design low coupled. The integration of improved access control with blockchain enables the proposed framework to provide a highly scalable solution, tamper-proof, and flexible to manage conflicting scenarios. The proposed system outperforms the recent studies significantly in computational overhead in extensive simulation results. To verify the scalability and efficiency, the proposed is evaluated against a large number of concurrent virtual clients in simulation and statistical analysis proves that the proposed system is promising for further research in this domain.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.