Skip to Content
IoT Security
book

IoT Security

by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila
February 2020
Intermediate to advanced
320 pages
11h 11m
English
Wiley
Content preview from IoT Security

3Symmetric Key‐Based Authentication with an Application to Wireless Sensor Networks

An Braeken

Abstract

This chapter starts with an introduction on different methods to provide key establishment and authentication using symmetric key‐based mechanisms limited to hashing, xoring and encryption/decryption operations. Based on an idea coming from the context of multi‐server authentication, and already applied in several IoT contexts, we present a new key management protocol for wireless sensor networks with hierarchical architecture, using solely symmetric key‐based operations. The protocol establishes confidentiality, integrity, and authentication. It supports various communication scenarios, has limited storage requirements, is highly energy efficient by minimizing the number of communication phases and cryptographic operations, and avoids message fragmentation as much as possible. With the pre‐installation of an individual secret key with the base station and some additional key material different for cluster head and cluster node, all possible keys in the network can be efficiently on‐the‐fly computed and updated. We discuss the differences with the well‐known LEAP key management system for wireless sensor networks.

3.1 Introduction

When a common secret is shared between two entities, symmetric key schemes in authenticated encryption (AE) mode, like for instance AES‐GCM or AES‐CCM, can be applied. However, in order to construct such an authenticated key, called the session key, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Internet of Things Security

Practical Internet of Things Security

Brian Russell, Drew Van Duren
Securing the Internet of Things

Securing the Internet of Things

Shancang Li, Li Da Xu

Publisher Resources

ISBN: 9781119527923Purchase book