
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Author(s) -
Yamina Benslimane,
Khelifa BenAhmed
Publication year - 2017
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v7i6.pp3622-3631
Subject(s) - 6lowpan , computer science , internet layer , computer network , key management , node (physics) , security association , the internet , key (lock) , key exchange , resource reservation protocol , protocol (science) , internet protocol , cryptographic protocol , ipv6 , computer security , internet protocol suite , cryptography , public key cryptography , encryption , world wide web , operating system , security information and event management , cloud computing , alternative medicine , cloud computing security , structural engineering , pathology , engineering , medicine
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.