Next Article in Journal
The Application of Ant Colony Algorithms to Improving the Operation of Traction Rectifier Transformers
Next Article in Special Issue
Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure
Previous Article in Journal
The Use of an Artificial Neural Network to Process Hydrographic Big Data during Surface Modeling
Article Menu
Issue 1 (March) cover image

Export Article

Open AccessArticle

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

1
Departement of Electronics and Informatics, Vrije Universiteit Brussel, 1050 Brussels, Belgium
2
Department of Engineering Technology, Vrije Universiteit Brussel, 1050 Brussels, Belgium
*
Author to whom correspondence should be addressed.
This paper is an extended version of the conference paper: Carlier, M.; Steenhaut, K.; Braeken, A. Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks. Presented at the 4th International Conference on Cloud Computing Technologies and Applications (CloudTech 2018), Brussels, Belgium, 26–28 November 2018.
Computers 2019, 8(1), 27; https://doi.org/10.3390/computers8010027
Received: 21 February 2019 / Revised: 12 March 2019 / Accepted: 12 March 2019 / Published: 19 March 2019
  |  
PDF [786 KB, uploaded 19 March 2019]
  |  

Abstract

This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code. View Full-Text
Keywords: multicast; security; mutual authentication; wireless sensor networks; lagrange interpolation; symmetric key multicast; security; mutual authentication; wireless sensor networks; lagrange interpolation; symmetric key
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Carlier, M.; Steenhaut, K.; Braeken, A. Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks. Computers 2019, 8, 27.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Computers EISSN 2073-431X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top