TY - GEN
T1 - An effective dynamic membership authentication and key management scheme in wireless sensor networks
AU - Shi, Hao
AU - Fan, Mingyu
AU - Zhang, Yu
AU - Chen, Maoyang
AU - Liao, Xingyu
AU - Hu, Wenqiang
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - Wireless sensor networks (WSN) have been widely used in the field of industrial Internet of Things (IoT), one of the main security challenges is how to protect the transmission of sensitive data between sensors in the wireless channel. Key management is one of the most challenging work. Most IoT sensors' resources are limited, so the key management scheme should be designed to be as lightweight as possible. Generally, schemes can be divided into two categories: pairwise key management and group key management, but each of them has its limitations. In this paper, we propose a dynamic membership authentication and key management scheme for WSN. In our scheme, we add the access object authentication and key update mechanism, ensure the authenticity of the connected object and key freshness. Compared with other schemes, our solution ensures forward and backward secrecy and resists capture attacks. We finally demonstrate that our scheme is of confidentiality, integrity, and scalability for resource-constrained WSN.
AB - Wireless sensor networks (WSN) have been widely used in the field of industrial Internet of Things (IoT), one of the main security challenges is how to protect the transmission of sensitive data between sensors in the wireless channel. Key management is one of the most challenging work. Most IoT sensors' resources are limited, so the key management scheme should be designed to be as lightweight as possible. Generally, schemes can be divided into two categories: pairwise key management and group key management, but each of them has its limitations. In this paper, we propose a dynamic membership authentication and key management scheme for WSN. In our scheme, we add the access object authentication and key update mechanism, ensure the authenticity of the connected object and key freshness. Compared with other schemes, our solution ensures forward and backward secrecy and resists capture attacks. We finally demonstrate that our scheme is of confidentiality, integrity, and scalability for resource-constrained WSN.
KW - Internet of Things
KW - Key management
KW - Membership authentication
KW - Security
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=85119346655&partnerID=8YFLogxK
U2 - 10.1109/WCNC49053.2021.9417320
DO - 10.1109/WCNC49053.2021.9417320
M3 - Conference contribution
AN - SCOPUS:85119346655
T3 - IEEE Wireless Communications and Networking Conference, WCNC
BT - 2021 IEEE Wireless Communications and Networking Conference, WCNC 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2021 IEEE Wireless Communications and Networking Conference, WCNC 2021
Y2 - 29 March 2021 through 1 April 2021
ER -