Standard

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks. / Carlier, Matthias; Steenhaut, Kris; Braeken, An.

In: Computers, Vol. 8, No. 27, 19.03.2019, p. 1-15.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

BibTeX

@article{59c89fafdb094db89c9c19a1b6149650,
title = "Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks",
abstract = "This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code.",
keywords = "multicast, security, mutual authentication, wireless sensor networks, lagrange interpolation, symmetric key cryptography",
author = "Matthias Carlier and Kris Steenhaut and An Braeken",
year = "2019",
month = "3",
day = "19",
language = "English",
volume = "8",
pages = "1--15",
journal = "Computers",
issn = "2073-431X",
publisher = "MDPI",
number = "27",

}

RIS

TY - JOUR

T1 - Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

AU - Carlier, Matthias

AU - Steenhaut, Kris

AU - Braeken, An

PY - 2019/3/19

Y1 - 2019/3/19

N2 - This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code.

AB - This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code.

KW - multicast

KW - security

KW - mutual authentication

KW - wireless sensor networks

KW - lagrange interpolation

KW - symmetric key cryptography

M3 - Article

VL - 8

SP - 1

EP - 15

JO - Computers

JF - Computers

SN - 2073-431X

IS - 27

ER -

ID: 44905705