پیش توزیع کلید بر اساس طراحی تکمیل بلوک در امنیت اینترنت اشیا
محورهای موضوعی : امنیت اطلاعاتوحید چگنی 1 , حمید حاج سید جوادی 2 , محمد رضا معظمی گودرزی 3
1 - دانشکده کامپیوتر، واحد خرم آباد، دانشگاه آزاد اسلامی، خرم آباد، ایران
2 - دانشکده ریاضی و علوم کامپیوتر، دانشگاه شاهد، تهران، ایران
3 - دانشکده ریاضی، واحد بروجرد، دانشگاه آزاد اسلامی، بروجرد، ایران
کلید واژه: Internet of Things (IoT), Combinatorial Designs, Residual Design, Block Complementation, key management, key pre-distribution,
چکیده مقاله :
اینترنت اشیا به عنوان شبکه ای از دستگاه های هوشمند تعریف می شود که می توانند با اشیا دیگر ارتباط برقرار کرده و تبادل اطلاعات کنند. با توجه به ماهیت ناهمگن دستگاه های اینترنت اشیا و منابع محدود، ایجاد ارتباط امن بین دستگاه های اینترنت اشیا بسیار مهم است. استفاده از الگوریتم های قبلی برای رمزگذاری مانند RSA و AES محاسبات پیچیده و سنگینی دارد و مناسب نیست. بنابراین، روش های رمزگذاری سبک وزن مورد نیاز است. این مقاله یک طرح جدید و مهم پیش توزیع را ارائه میکند که برای دستیابی به درجه بالایی از امنیت پیشنهاد شده است. این ایده بر اساس طرحی است که از جبر ترکیبی، یعنی طرح باقیمانده، مشتق شده است. طبق این طرح، هر دستگاه در اینترنت اشیا دارای مجموعه ای از کلیدها به نام حلقه کلید از یک مجموعه کلید اختصاص داده شده به آن خواهد بود. لازم به ذکر است که طرح باقیمانده که از مکمل بلوک ساخته شده است برای اولین بار در اینترنت اشیا استفاده می شود. یک نقشه برداری اساسی از طراحی باقیمانده تا پیش توزیع کلید نشان داده شده است. یکی دیگر از مزایای این رویکرد، بهبود انعطاف پذیری اینترنت اشیا در عین حفظ مقیاس پذیری بالا است. ارزیابیهای انجامشده نشان میدهد که رویکرد ما منجر به بهبود اتصال امن و افزایش مقیاسپذیری اینترنت اشیا با انعطافپذیری بالا میشود.
The Internet of Things is defined as a network of smart devices that can connect and exchange data with other things. Due to the heterogeneous nature of IoT devices and constrained-resources, creating a secure connection between IoT devices is very important. The use of previous algorithms for encryption such as RSA and AES has a complex and heavy computation and is not suitable. Therefore, lightweight encryption methods are required. This paper presents a new and important pre-distribution scheme that is proposed to attain a high degree of security. This scheme is based on a design derived from combinatorial algebra, namely the residual design. According to this scheme, each device in IoT will have a set of keys called the key-ring from a key pool assigned to it. It should be noted that the residual design that is built from block complementation is being used in the IoT for the first time. A basic mapping from residual design to key pre-distribution is illustrated. Another advantage of this approach is improving the IoT resilience while maintaining high scalability. The evaluations performed indicate that our approach leads to an improvement of secure connectivity and an increase in the IoT scalability with high resilience.
T. Gomes, F. Salgado, S. Pinto, J. Cabral and A. Tavares, “A 6LoWPAN Accelerator for Internet of Things Endpoint Devices,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 371-377, 2018.
J. Granjal, E. Monteiro and J. Sá Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research issues,” IEEE Communications Surveys & Tutorials , vol. 17, no. 3, pp. 1294 - 1312, 2015.
C. Hennebert and j. D. Santos, “Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis,” IEEE Internet of Things Journal , vol. 1, no. 5, pp. 384-398, 2014.
S. Raza, H. Shafagh, K. Hewage, R. Hummen and T. Voigt, “Lithe: Lightweight Secure CoAP for the Internet of Things,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3711-3720, 2013.
M. Husamuddin and M. Qayyum, “Internet of Things :A Study on Security and Privacy Threats,” in 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017.
M. Saadeh, Z. Sleit, M. Qatawneh and W. Almobaideen, “Authentication Techniques for the Internet of Things: A Survey,” in Cybersecurity and Cyberforensics Conference, Amman, Jordan, 2016.
T. Kavitha and D. Sridharan, “Hybrid design of scalable key distribution for wireless sensor networks,” International Journal of Engineering and Technology, vol. 2, no. 2, p. 136–141, 2010.
M. Malik, M. Dutta and J. Granjal, “A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things,” IEEE Access, vol. 7, pp. 27443 - 27464, 2019.
M. Anzani, H. Haj Seyyed Javadi and V. Modiri, “Key-management scheme for wireless sensor networks based on merging blocks of symmetric design,” Wireless Networks, vol. 24, no. 8, p. 2867–2879, 2017.
M. Tajeri, H. H. S. Javadi, M. Bayat and M. E. Shiri, “Pre-Distribution Encryption Key Scheme for Communicating between IoT Device Layer and Fog Layer,” Cybernetics and Systems, pp. 1-25, 2022.
S. A. Camtepe and B. Yener, “Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks,” IEEE/ACM Transactions on Networking, vol. 15, no. 2, pp. 346 - 358, April 2007.
T. Dargahi, H. H. S. Javadi and M. Hosseinzade, “Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks,” Security and Communication Networks, vol. 8, no. 8, pp. 1561-1574, May 2015.
C. Y. Chen and H. C. Chao, “A survey of key distribution in wireless sensor networks,” Security and Communication Networks, vol. 7, pp. 2495-2508, 2014.
C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han, “Adaptive key pre-distribution model for distributed sensor networks,” IET Communications, vol. 3, no. 5, p. 723 – 732, 2009.
J. Zhang, Y. Sun and L. Liu, “NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks,” in IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07), Shanghai, China, 2007.
S. A. Camtepe and B. Yener, “Key Distribution Mechanisms for Wireless Sensor Networks: a Survey,” Troy, NY, 2005.
A. Pattanayak and B. Majhi, “Key predistribution schemes in distributed wireless sensor network using combinatorial designs revistied,” 2009.
D. Liu, P. Ning and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 1, pp. 41-77, February 2005.
S. Akhbarifar, H. Haj Seyyed Javadi, A. M. Rahmani and M. Hosseinzadeh, “Hybrid Key Pre distribution Scheme Based on Symmetric Design,” Iranian Journal of Science and Technology, Transactions A: Science, vol. 28, no. 39, p. 1–8, 2019.
H. Haj Seyyed Javadi and M. Anzani, “Hybrid Key Pre-distribution Scheme for Wireless Sensor Network Based on Combinatorial Design,” Journal of Advances in Computer Engineering and Technology, vol. 1, no. 3, pp. 33-38, 2015.
S. H. Erfani, H. Haj Seyyed Javadi and A. M. Rahmani, “Analysis of Key Management Schemes in Dynamic Wireless Sensor Networks,” Advances in Computer Science: an International Journal, vol. 4, no. 1, pp. 117-121, 2015.
S. H. Erfani, H. Haj Seyyed Javadi and A. M. Rahmani, “A dynamic key management scheme for dynamic wireless sensor networks,” Security and Communication Networks, vol. 8, no. 6, pp. 1040-1049, 2014.
D. Chen, G. Chang, D. Sun, J. Jia and X. Wang, “Lightweight key management scheme to enhance the security of internet of things,” International Journal of Wireless and Mobile Computing, vol. 5, no. 2, pp. 191-198, 2012.
N. Solari Esfehani and H. Haj Seyyed Javadi, “A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network,” Wireless Networks, vol. 27, no. 4, pp. 3025-3052, 2021.
L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, 2002.
H. Chan, A. Perrig and D. Song, “Random Key predistribution Schemes for Sensore Networks,” in Symposium on Security and Privacy, Berkeley, CA, USA, 2003.
S. Qian, “A Novel Key Pre-distribution for Wireless Sensor Networks,” in International Conference on Solid State Devices and Materials Science, 2012.
A. Morshed Aski and H. Haj Seyyed Javadi, “A novel key pre-distribution scheme based on -PBIBD combinatorial design in the resource-constrained IoT network,” arXiv preprint arXiv:2102.07137, 2021.
B. Vinayaga Sundaram, M. Ramnath, M. Prasanth and J. Varsha Sundaram, “Encryption and Hash based Security in Internet of Things,” in 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, 2015.
V. Chegeni, H. Haj Seyyed Javadi, M. R. Moazami Goudarzi and A. Rezakhani, “A scalable key pre-distribution scheme based on the unital design for the internet of things security,” IETE Journal of Research, pp. 1-12, 2021.
F. K. Santoso and N. C. H. Vun, “Securing IoT for smart home system,” in International Symposium on Consumer Electronics (ISCE), Madrid, 2015.
N. Sklavos and I. D. Zaharakis, “Cryptography and Security in Internet of Things (IoTs) : Models, Schemes and Implementations,” in 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, 2016.
M. Anzani, H. Haj Seyyed Javadi and A. Moeni, “A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme,” Iranian Journal of Science and Technology, Transactions A: Science, vol. 42, no. 2, p. 777–786, June 2018.
M. Javanbakht, H. Erfani, H. Haj Seyyed Javadi and P. Daneshjoo, “Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs,” Security and Communication Networks, vol. 7, no. 11, pp. 2003-2014, November 2014.
V. Modiri, H. Haj Seyyed Javadi and M. Anzani, “A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design,” Wireless Personal Communications, vol. 96, no. 2, p. 2821–2841, September 2017.
V. Modiri, H. Haj Seyyed Javadi and M. Anzani, “Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks,” Journal of Information Systems and Telecommunication (JIST), vol. 8, no. 1, pp. 53-61, 2020.
A. Kumar, N. Bansal and A. R. Pais, “New key pre-distribution scheme based on combinatorial design for wireless sensor networks,” IET Communications, vol. 13, no. 7, p. 892 – 897, 2019.
G. Gaubatz, J.-P. Kaps, E. Ozturk and B. Sunar, “State of the art in ultra-low power public key cryptography for wireless sensor networks,” in Third IEEE International Conference on Pervasive Computing and Communications Workshops, Kauai Island, 2005.
J. Granjal, E. Monteiro and J. Silva, “End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication,” in IFIP Networking Conference, Brooklyn, NY, 2013.
S. Ruj and B. Roy, “Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks,” ACM Trans. Sensor Netw, vol. 6, no. 4, pp. 1-4, Jan 2010.
W. Bechkit, Y. Challal, A. Bouabdallah and V. Tarokh, “A highly scalable key pre-distribution scheme for wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 2, p. 948–959, 2013.
A. Morshed Aski, H. Haj Seyyed Javadi and G. H. Shirdel, “A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network,” Wireless Personal Communications, vol. 114, no. 3, 2020.
A. Dey, Theory of block designs, J. Wiley, 1986.
C. J. Colbourn and J. H. Dinitz, Handbook of combinatorial designs, CRC press, 2010.
D. R. Stinson, Combinatorial Designs: Constructions and Analysis, New York: Springer, 2004.
H. R. Sharifi, H. Haj Seyyed Javadi, A. Moeini and M. Hosseinzadeh, “Residual design of sink localization algorithms for wireless sensor networks,” Journal of High Speed Networks, vol. 25, no. 1, pp. 87-99, 2019.
P. Nikkhah Bahrami, H. Haj Seyyed Javadi, T. Dargahi, A. Dehghantanha and K. K. Raymond , “A Hierarchical Key Pre-Distribution Scheme for Fog Networks,” Concurrency and Computation: Practice and Experience, 2018.
S. Ruj, A. Nayak and I. Stojmenovic, “Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2224 - 2237, 2013.