Next Article in Journal
The Application of Ant Colony Algorithms to Improving the Operation of Traction Rectifier Transformers
Next Article in Special Issue
Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure
Previous Article in Journal
The Use of an Artificial Neural Network to Process Hydrographic Big Data during Surface Modeling
Article

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks †

1
Departement of Electronics and Informatics, Vrije Universiteit Brussel, 1050 Brussels, Belgium
2
Department of Engineering Technology, Vrije Universiteit Brussel, 1050 Brussels, Belgium
*
Author to whom correspondence should be addressed.
This paper is an extended version of the conference paper: Carlier, M.; Steenhaut, K.; Braeken, A. Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks. Presented at the 4th International Conference on Cloud Computing Technologies and Applications (CloudTech 2018), Brussels, Belgium, 26–28 November 2018.
Computers 2019, 8(1), 27; https://doi.org/10.3390/computers8010027
Received: 21 February 2019 / Revised: 12 March 2019 / Accepted: 12 March 2019 / Published: 19 March 2019
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code. View Full-Text
Keywords: multicast; security; mutual authentication; wireless sensor networks; lagrange interpolation; symmetric key multicast; security; mutual authentication; wireless sensor networks; lagrange interpolation; symmetric key
Show Figures

Figure 1

MDPI and ACS Style

Carlier, M.; Steenhaut, K.; Braeken, A. Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks. Computers 2019, 8, 27. https://doi.org/10.3390/computers8010027

AMA Style

Carlier M, Steenhaut K, Braeken A. Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks. Computers. 2019; 8(1):27. https://doi.org/10.3390/computers8010027

Chicago/Turabian Style

Carlier, Matthias, Kris Steenhaut, and An Braeken. 2019. "Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks" Computers 8, no. 1: 27. https://doi.org/10.3390/computers8010027

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop