Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/7807
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLevi, Albert-
dc.contributor.authorSarımurat, Salim-
dc.date.accessioned2021-09-11T16:09:54Z-
dc.date.available2021-09-11T16:09:54Z-
dc.date.issued2017en_US
dc.identifier.issn1570-8705-
dc.identifier.issn1570-8713-
dc.identifier.urihttps://doi.org/10.1016/j.adhoc.2016.08.013-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/7807-
dc.description.abstractIn most general terms, Internet of Thing (IoT) applications and networks contain interconnected equipment, which are mostly resource constrained. Sensor nodes with sensing and communication capabilities are widely referred as a "thing" in IoT domain in the literature. On the other hand, mobility is an important concern to provide sustainable security and privacy for IoT applications. Solutions that provide high performance security and privacy with static nodes may perform badly when the nodes are mobile. To this end, a security and privacy infrastructure for mobile IoT deployments requires a flexible cryptographic key distribution mechanism with the support of continuous secure connectivity and resiliency even in the case of node replacements. The concept of continuity by deploying new nodes in the area has been studied under multiphase wireless sensor network topic in the literature. In this type of multiphase networks, key rings of the newly deployed nodes are selected from their deployment generation key pools to improve the resiliency and to ensure constant secure connectivity. Nevertheless, the existing research in this area assumes fixed and/or uniformly distributed network lifetime from key distribution point of view. In IoT terms, as the entire lifetime of an application and the underlying networks cannot be guessed a priori, this issue should also be addressed while designing a key distribution mechanism. In this paper, we propose Hash Graph (HaG) scheme for key predistribution among a large set of sensor nodes in a sustainable and secure way. In our HaG scheme, every generation has its own key pool which is generated using the key pool of the previous generation. Since this is an iterative process, there is no limit on the total number of generations, providing flexible network lifetime property to our HaG scheme. This allows nodes deployed at different generations to have the ability to establish secure channels. Likewise, a captured node can only be used to obtain keys for a limited amount of successive generations. We also consider sensor nodes as mobile and use different mobility models to show its effects on the performance. We compare the connectivity and resiliency performance of our scheme with a state-of-the-art multiphase key predistribution scheme and show that our scheme performs considerably better when the attack rate is low. When the attack rate increases, our scheme still has better resiliency performance considering that it requires less key ring size compared to a state-of-the-art multiphase scheme. (C) 2016 Elsevier B.V. All rights reserved.en_US
dc.description.sponsorshipScientific and Technological Research Council of Turkey (TUBITAK)Turkiye Bilimsel ve Teknolojik Arastirma Kurumu (TUBITAK) [110E180]en_US
dc.description.sponsorshipThis work was partially supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under grant 110E180. A preliminary version of this paper was presented in the Proceedings of IEEE International Conference on Communications (ICC-2013), Budapest, Hungary, June 2013.en_US
dc.language.isoenen_US
dc.publisherElsevier Science Bven_US
dc.relation.ispartofAd Hoc Networksen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectKey predistributionen_US
dc.subjectIoT security and privacyen_US
dc.subjectMobile IoTen_US
dc.subjectSecure connectivity and Resiliencyen_US
dc.titleUtilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT contexten_US
dc.typeArticleen_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.volume57en_US
dc.identifier.startpage3en_US
dc.identifier.endpage18en_US
dc.authorid0000-0002-9714-3897-
dc.identifier.wosWOS:000394400100002en_US
dc.identifier.scopus2-s2.0-85001122886en_US
dc.institutionauthorSarımurat, Salim-
dc.identifier.doi10.1016/j.adhoc.2016.08.013-
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - İdari Personel ve Öğrencien_US
dc.identifier.scopusqualityQ1-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.languageiso639-1en-
item.grantfulltextnone-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

5
checked on Nov 2, 2024

WEB OF SCIENCETM
Citations

11
checked on Nov 2, 2024

Page view(s)

62
checked on Nov 4, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.