scispace - formally typeset
Open AccessJournal ArticleDOI

Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN

Reads0
Chats0
TLDR
A logical tree-based secure mobility management scheme (LT-SMM) using mobile service computing in IoT, which includes the group deployment phase where smart devices securely setup a group by registering with group heads for future secure information exchange.
Abstract
With the rapid growth in a huge number of devices connecting online, Internet of Things (IoT) is rapidly growing and getting interested of researchers. IoT enabled wireless sensor network (WSN) plays a significant role to collect sensing data and transmit to central repositories. Moreover, multicasting ensures efficient group communication for disseminating the same query or command to all smart devices to perform mobile service computing. It is applicable in the smart home, healthcare, smart cities, and smart industries for monitoring and control. To secure such sensitive information exchange, we have considered a secure group communication scenario where logical trees are maintained for each group. The main problem is unnecessary rekeying when a smart device frequently joining or leaving the network. It causes computation, communication, and energy overheads. To overcome the excessive rekeying problem, we have presented a logical tree-based secure mobility management scheme (LT-SMM) using mobile service computing in IoT. It includes the group deployment phase where smart devices securely setup a group by registering with group heads for future secure information exchange. We have presented group deployment, mobile node joining and mobile node migration protocols. Moreover, we have used chaotic map based one-way hash functions to ensure message integrity. To validate our work, extensive simulations are performed using NS 2.35. TCL code is used to configure smart devices, deploy logical tree, messaging. C language is used for algorithm implementation and messaging backend coding. The results verify the supremacy of our scheme as compared to existing tree based schemes in terms of computation, communication, and energy consumption.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Security in product lifecycle of IoT devices: A survey

TL;DR: This article provides a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security, and presents prominent solutions for addressing product lifecycle security in IoT.
Journal ArticleDOI

A decentralized scalable security framework for end-to-end authentication of future IoT communication

TL;DR: A decentralized and scalable security framework for future IoT is designed that exploits the advantages of intelligent computing and tree‐based hash for device and request authentication to provide device‐to‐device security.
Journal ArticleDOI

SecDL: QoS-Aware Secure Deep Learning Approach for Dynamic Cluster-Based Routing in WSN Assisted IoT

TL;DR: The proposed SecDL approach achieves security, QoS and energy efficiency in dynamic cluster-based WSN-IoT networks and also concentrates on IoT-user security since the sensory data can be accessed by IoT users.
Journal ArticleDOI

Smart Applications in Edge Computing: Overview on Authentication and Data Security

TL;DR: The security protection requirements of smart applications in the edge computing environment are analyzed from the perspective of identity authentication and data security and some state-of-the-art works on them are reviewed.
Journal ArticleDOI

EADCR: Energy Aware Distance Based Cluster Head Selection and Routing Protocol for Wireless Sensor Networks

TL;DR: Wireless Sensor Networks are used for data collection from the surrounding environment using the enormous amount of sensor nodes to save energy.
References
More filters
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues

TL;DR: This exhaustive survey provides insights into the state-of-the-art of IoT enabling and emerging technologies and brings order in the existing literature by classifying contributions according to different research topics.
Journal ArticleDOI

How Can Heterogeneous Internet of Things Build Our Future: A Survey

TL;DR: A four-layer HetIoT architecture consisting of sensing, networking, cloud computing, and applications is proposed, including self-organizing, big data transmission, privacy protection, data integration and processing in large-scale Het IoT.
Journal ArticleDOI

Short-Term Wind Speed Forecasting via Stacked Extreme Learning Machine With Generalized Correntropy

TL;DR: An enhanced SELM is developed via replacing the Euclidean norm of the mean square error (MSE) criterion in ELM with the generalized correntropy criterion to further improve the forecasting performance.
Related Papers (5)