Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks

View article
PeerJ Computer Science

Main article text

 

Introduction

  • Offers more effective resilience to node capture attacks for the λ-secure problem and has better resistance than other key management schemes.

  • The wireless sensor network has a high connectivity rate. Our scheme uses an identity mapping algorithm to map a series of coefficients of P(x,y), and each pair of communication nodes is able to establish a pairwise key.

  • Low computational overhead. Even though the phase of pairwise key establishment consumes more energy than the other key management schemes, the node’s chip is sufficient to deal with polynomial and hash algorithms.

  • Low communication overhead. All communication nodes exchange identity information with each other, and the sensor network directly implements the identity mapping algorithm with the identity information of sensor nodes to get pairwise keys. There are no extra communication streams, except for identity information, during the process of pairwise key establishment, which can greatly reduce communication overhead.

  • Low storage overhead. With a value of λ = 7, our scheme in pairwise key establishment generates quite a small amount of code. The shared matrix M can generate a series of coefficients of P(x,y) according to the sensor node’s ID, and the sensor network of a head-cluster node is able to hold 1.75 × 105 nodes, which meets the requirements of many scenarios.

Preliminaries

Notation

Network model

Overview of proposed scheme

Key pre-distribution phase

Key agreement phase

Theoretical analysis

λ-security of symmetric polynomial

Size of polynomial pool with different λ

Performance analysis

Resilience against node capture

Probability of at least one matrix being broken

The fraction of compromised network communication

Comparison to previous work

Resilience to node capture in our scheme

Connectivity rate

Resource overhead

Computational overhead

Communication overhead

Storage overhead

Conclusions

Supplemental Information

Additional Information and Declarations

Competing Interests

The authors declare that they have no competing interests.

Author Contributions

Zhongya Liu conceived and designed the experiments, analyzed the data, prepared figures and/or tables, and approved the final draft.

Yunxiao Luo performed the experiments, performed the computation work, authored or reviewed drafts of the article, and approved the final draft.

Data Availability

The following information was supplied regarding data availability:

The scripts are available in the Supplemental File.

Funding

This study was supported by the Science and Technology Research Program of Chongqing Municipal Education Commission C: (Grant: KJQN202104004) and the Natural Science Foundation of Chongqing (Grant: CSTB2022NSCQ-MSX1632). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

730 Visitors 788 Views 32 Downloads

Your institution may have Open Access funds available for qualifying authors. See if you qualify

Publish for free

Comment on Articles or Preprints and we'll waive your author fee
Learn more

Five new journals in Chemistry

Free to publish • Peer-reviewed • From PeerJ
Find out more