Efficient End-to-End Secure Key Management Protocol for Internet of Things (original) (raw)
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties. Keyword: 6LoWPAN network Internet of things Key management protocol 6LoWPAN routers AVISPA tool 1. INTRODUCTION The internet of things has made a revolution in the world of communication by connected the physical objects to Internet. According to [1] (IoT) is a concept and a paradigm that considers pervasive presence in the environment of a variety of things/objects that through wireless and wired connections and unique addressing schemes are able to interact with each other and cooperate with other things/objects to create new applications/services. The internet of things (IoT) describes the next generation of Internet, where the physical things or objects are connected, accessed and identified through the Internet, many technologies are involved in IoT, such as WSN (Wireless Sensors network) [2], intelligent sensing, Radio Frequency Identification (RFID) [3], 6LoWPAN [4], Near Field communications (NFC) [5] [6], low energy wireless communication , cloud computing, and so on. These technologies will interact with physical phenomena by employing more constrained sensing platforms and low-energy wireless communications, therefore, end-to-end communication between constrained sensing devices and other Internet host will be a fundamental requirement of many sensing application using these technologies, this aspects that seriously complicate the design and adoption of appropriate security mechanisms especially end-to-end security mechanisms.