Energy-aware key management and access control for the Internet of things

被引:0
|
作者
Mohammedi, Mohamed [1 ]
Omar, Mawloud [2 ]
Zamouche, Djamila [1 ]
Louiba, Kahina [1 ]
Ouared, Saliha [1 ]
Hocini, Kenza [3 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Lab Informat Med, Bejaia 06000, Algeria
[2] Univ Gustave Eiffel, ESIEE Paris, LIGM, Noisy Le Grand, France
[3] Univ Bejaia, Unite Rech LaMOS Modelisat & Optimisat Syst, Fac Sci Exactes, Bejaia 06000, Algeria
关键词
Internet of things; Security; Key management; Symmetric key; Access control; CONTROL SCHEME; COMMUNICATION; ESTABLISHMENT;
D O I
10.1007/s11280-020-00861-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need to establish a secure communication for most applications of Internet of Things (IoT) has become increasingly crucial. Nevertheless, one of the major issues of such networks is how to establish cryptographic keys between all IoT objects to ensure secure data exchange. Several key management schemes have been suggested in the literature to achieve this goal, but they must be revised and innovated, while taking into account the limited resources of IoT objects. Likewise, the IoT presents a system where objects belonging to the physical world, are connected to the Internet, and have the capacity to measure, communicate, and act around all over the world. Nevertheless, some information available to IoT objects is private, hence the need to ensure an access control whose aim is to guarantee that the information be accessible only to those whose the access is allowed. In this paper, we propose a scheme involving two basic modules, namely key management, and access control. The key management module is designed to ensure both the generation and storage of symmetric keys for IoT objects in a completely distributed manner without resorting to a central authority. In contrast, the access control module is used to impose an access control policy so as to prevent unauthorized access to services provided by a particular IoT object. The latter is ensured thanks to the existing cooperation between the TGOs servers of different domains in the IoT. Through assessments based on security analysis, we demonstrate that the proposed scheme is more secure than the existing ones. Simulations were also performed to validate the proposed solution by comparing it with some relevant concurrent schemes. The obtained results are not only encouraging, but also very favorable for the proposed scheme.
引用
收藏
页码:1089 / 1120
页数:32
相关论文
共 50 条
  • [41] VoI and Energy-Aware AUV-Assisted Data Collection for Internet of Underwater Things
    Xu, Jingzehua
    Zhang, Zekai
    Wang, Ziyuan
    Wang, Jingjing
    Ren, Yong
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [42] Preference-Aware User Access Control Policy in Internet of Things
    Li, Songnong
    Yan, Yao
    Ji, Yongliang
    Peng, Wenxin
    Wan, Lingyun
    Zhang, Puning
    SENSORS, 2023, 23 (13)
  • [43] Adaptive risk-aware access control model for Internet of Things
    Rath, Annanda Thavymony
    Colin, Jean-Noel
    2017 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2017), 2017, : 40 - 49
  • [44] Priority/Demand-Based Resource Management with Intelligent O-RAN for Energy-Aware Industrial Internet of Things
    Ros, Seyha
    Kang, Seungwoo
    Song, Inseok
    Cha, Geonho
    Tam, Prohim
    Kim, Seokhoon
    PROCESSES, 2024, 12 (12)
  • [45] Efficient and energy-aware key management framework for dynamic sensor networks
    Omar, Mawloud
    Belalouache, Imene
    Amrane, Samia
    Abbache, Bournane
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 : 990 - 1005
  • [46] Control Application for Internet of Things Energy Meter - a Key Part of Integrated Building Energy Management System
    Ozadowicz, Andrzej
    Grela, Jakub
    PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,
  • [47] Access Control for the Internet of Things
    Fotiou, Nikos
    Kotsonis, Theodore
    Marias, Giannis F.
    Polyzos, George C.
    2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 29 - 38
  • [48] Access Control and the Internet of Things
    Cerf, Vinton G.
    IEEE INTERNET COMPUTING, 2015, 19 (05) : 96 - 97
  • [49] QPSO-based Energy-aware Clustering Scheme in the Capillary Networks for Internet of Things Systems
    Song, Liumeng
    Chai, Kok Keong
    Chen, Yue
    Loo, Jonathan
    Jimaa, Shihab
    Schormans, John
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [50] Energy-Aware Real-Time Routing for Large-Scale Industrial Internet of Things
    Nguyen Bach Long
    Hoa Tran-Dang
    Kim, Dong-Seong
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 2190 - 2199