Key management in internet of things via kronecker product

I. Chen Tsai, Chia Mu Yu, Haruo Yokota, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations

Abstract

As the number of everyday objects connected to the Internet grows rapidly, securing these connected devices is a big security challenge. Key establishment in Internet of Things (IoT) becomes a challenging problem when considering the resource constrained sensor nodes. In spite of the fact that many clever solutions have been proposed, no practical and suitable scheme has emerged, especially for the extremely large amount of sensor nodes in the wireless sensor network (WSNs) in the future. In this paper, we propose a new key establishment scheme for IoT. The scheme is achieved by Kronecker product and satisfies the following conditions. 1) Substantially decreases the amount of data needs to be stored in a sensor node, 2) efficiently compute the pairwise key, 3) no communication is needed during the computation of the keys. The security evaluation is performed and we also present an in depth analysis of our scheme in terms of computation cost, communication cost and storage cost.

Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017
EditorsMasato Kitakami, Dong Seong Kim, Vijay Varadharajan
PublisherIEEE Computer Society
Pages118-124
Number of pages7
ISBN (Electronic)9781509056514
DOIs
StatePublished - 05 05 2017
Externally publishedYes
Event22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017 - Christchurch, New Zealand
Duration: 22 01 201725 01 2017

Publication series

NameProceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
ISSN (Print)1541-0110

Conference

Conference22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017
Country/TerritoryNew Zealand
CityChristchurch
Period22/01/1725/01/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Internet of Things
  • Key establishment
  • Key management
  • Kronecker product
  • Security

Fingerprint

Dive into the research topics of 'Key management in internet of things via kronecker product'. Together they form a unique fingerprint.

Cite this