A Review on Key Pre-distribution Schemes based on Combinatorial Designs for Internet of Things Security

Authors

  • Otmane EL MOUAATAMID ICES Team, Computer Science Department, National School of Computer Science and Systems Analysis (ENSIAS), Mohammed V University in Rabat
  • Mohamed LAHMER Department of Computer, Information and Communication Systems Engineering Research Group, Higher School of Technology, Moulay Ismail University
  • Mostfa BELKASMI ICES Team, Computer Science Department, National School of Computer Science and Systems Analysis (ENSIAS), Mohammed V University in Rabat

Keywords:

key Pre-distribution, Internet of Things, IoT security, Combinatorial designs

Abstract

This paper is a review of problems and challenges in the Internet of things (IoT) security. The management of key pre-distribution is a cryptographic challenge in every kind of application where security is worried. In recent years there are many papers have proposed different schemes for security. We classify in this paper the existing solutions of key pre-distribution schemes, in order to categorize them, we draw a taxonomy and describe the key pre-distribution coming from combinatorial design and we give examples for that.

Downloads

Download data is not yet available.

References

Chen, ChiYuan, and HanChieh Chao. ”A survey of key distribution in wireless sensor networks.” Security and Communication Networks 7.12 (2014): 2495-2508.

Zhou, Yun, Yuguang Fang, and Yanchao Zhang. ”Securing wireless sensor networks: a survey.” IEEE Communications Surveys and Tutorials 10.3 (2008).

Dong, Junwu, Dingyi Pei, and Xueli Wang. ”A key predistribution scheme based on 3-designs.” International Conference on Information Security and Cryptology. Springer Berlin Heidelberg, 2007.

Chakrabarti, Dibyendu. Applications of combinatorial designs in key pre-distribution in sensor networks. Diss. Indian Statistical Institute, Kolkata, 2007.

Otmane El Mouaatamid, Mohammed Lahmer, and Mostafa Belkasmi. ”Internet of Things Security: Layered classification of attacks and possible Countermeasures.” Electronic Journal of Information Technology 9 (2016).

Eschenauer, Laurent, and Virgil D. Gligor. ”A key-management scheme for distributed sensor networks.” Proceedings of the 9th ACM conference on Computer and communications security. ACM, 2002.

Camtepe, S. A., Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report, 05-07.

Lee, Jooyoung, and Douglas R. Stinson. ”Deterministic key predistribution schemes for distributed sensor networks.” International Workshop on Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004.

Blom, Rolf. ”An optimal class of symmetric key generation systems.” Workshop on the Theory and Application of of Cryptographic Techniques. Springer Berlin Heidelberg, 1984.

Al-Shurman, Mohammad, and Seong-Moo Yoo. ”Key pre-distribution using mds codes in mobile ad hoc networks.” Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on. IEEE, 2006.

El Hajjar, Ayman. ”Securing the Internet of Things Devices Using Pre-Distributed Keys.” Cloud Engineering Workshop (IC2EW), 2016 IEEE International Conference on. IEEE, 2016.

Assmus, E. F. ”Designs and codes: an update.” Designs, Codes and Cryptography 9.1 (1996): 7-27.

Camtepe, Seyit A., and Blent Yener. ”Combinatorial design of key distribution mechanisms for wireless sensor networks.” European Symposium on Research in Computer Security. Springer Berlin Heidelberg, 2004.

Bose, Raj Chandra, and Sharadchandra S. Shrikhande. ”On the construction of sets of mutually orthogonal Latin squares and the falsity of a conjecture of Euler.” Transactions of the American Mathematical Society 95.2 (1960): 191-209.

Bechkit, Walid, et al. ”A highly scalable key pre-distribution scheme for wireless sensor networks.” IEEE Transactions on Wireless Communications 12.2 (2013): 948-959.

Lee, Jooyoung, and Douglas R. Stinson. ”A combinatorial approach to key predistribution for distributed sensor networks.” Wireless Communications and Networking Conference, 2005 IEEE. Vol. 2. IEEE, 2005.

Lamport, Leslie. ”Password authentication with insecure communication.” Communications of the ACM 24.11 (1981): 770-772.

Yu, Zhen, and Yong Guan. ”A key pre-distribution scheme using deployment knowledge for wireless sensor networks.” Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth International Symposium on. IEEE, 2005.

Camtepe, Seyit A., and Blent Yener. ”Key distribution mechanisms for wireless sensor networks: a survey.” Rensselaer Polytechnic Institute, Troy, New York, Technical Report (2005): 05-07.

El Mouaatamid O, Lahmer M, Belkasmi M. ”A Scalable Group Authentication Scheme Based on Combinatorial Designs with Fault Tolerance for the Internet of Things.” SN Computer Science. 2020 1(4):1-3.

Ruj, Sushmita, and Bimal Roy. ”Key predistribution schemes using codes in wireless sensor networks.” International Conference on Information Security and Cryptology. Springer Berlin Heidelberg, 2008

Downloads

Published

2021-01-25

How to Cite

[1]
O. EL MOUAATAMID, M. . LAHMER, and M. . BELKASMI, “A Review on Key Pre-distribution Schemes based on Combinatorial Designs for Internet of Things Security”, International Journal of Engineering and Applied Physics, vol. 1, no. 1, pp. 1–8, Jan. 2021.

Issue

Section

Articles