A Review on Key Pre-distribution Schemes based on Combinatorial Designs for Internet of Things Security
Keywords:
key Pre-distribution, Internet of Things, IoT security, Combinatorial designsAbstract
This paper is a review of problems and challenges in the Internet of things (IoT) security. The management of key pre-distribution is a cryptographic challenge in every kind of application where security is worried. In recent years there are many papers have proposed different schemes for security. We classify in this paper the existing solutions of key pre-distribution schemes, in order to categorize them, we draw a taxonomy and describe the key pre-distribution coming from combinatorial design and we give examples for that.
Downloads
References
Chen, ChiYuan, and HanChieh Chao. ”A survey of key distribution in wireless sensor networks.” Security and Communication Networks 7.12 (2014): 2495-2508.
Zhou, Yun, Yuguang Fang, and Yanchao Zhang. ”Securing wireless sensor networks: a survey.” IEEE Communications Surveys and Tutorials 10.3 (2008).
Dong, Junwu, Dingyi Pei, and Xueli Wang. ”A key predistribution scheme based on 3-designs.” International Conference on Information Security and Cryptology. Springer Berlin Heidelberg, 2007.
Chakrabarti, Dibyendu. Applications of combinatorial designs in key pre-distribution in sensor networks. Diss. Indian Statistical Institute, Kolkata, 2007.
Otmane El Mouaatamid, Mohammed Lahmer, and Mostafa Belkasmi. ”Internet of Things Security: Layered classification of attacks and possible Countermeasures.” Electronic Journal of Information Technology 9 (2016).
Eschenauer, Laurent, and Virgil D. Gligor. ”A key-management scheme for distributed sensor networks.” Proceedings of the 9th ACM conference on Computer and communications security. ACM, 2002.
Camtepe, S. A., Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report, 05-07.
Lee, Jooyoung, and Douglas R. Stinson. ”Deterministic key predistribution schemes for distributed sensor networks.” International Workshop on Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004.
Blom, Rolf. ”An optimal class of symmetric key generation systems.” Workshop on the Theory and Application of of Cryptographic Techniques. Springer Berlin Heidelberg, 1984.
Al-Shurman, Mohammad, and Seong-Moo Yoo. ”Key pre-distribution using mds codes in mobile ad hoc networks.” Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on. IEEE, 2006.
El Hajjar, Ayman. ”Securing the Internet of Things Devices Using Pre-Distributed Keys.” Cloud Engineering Workshop (IC2EW), 2016 IEEE International Conference on. IEEE, 2016.
Assmus, E. F. ”Designs and codes: an update.” Designs, Codes and Cryptography 9.1 (1996): 7-27.
Camtepe, Seyit A., and Blent Yener. ”Combinatorial design of key distribution mechanisms for wireless sensor networks.” European Symposium on Research in Computer Security. Springer Berlin Heidelberg, 2004.
Bose, Raj Chandra, and Sharadchandra S. Shrikhande. ”On the construction of sets of mutually orthogonal Latin squares and the falsity of a conjecture of Euler.” Transactions of the American Mathematical Society 95.2 (1960): 191-209.
Bechkit, Walid, et al. ”A highly scalable key pre-distribution scheme for wireless sensor networks.” IEEE Transactions on Wireless Communications 12.2 (2013): 948-959.
Lee, Jooyoung, and Douglas R. Stinson. ”A combinatorial approach to key predistribution for distributed sensor networks.” Wireless Communications and Networking Conference, 2005 IEEE. Vol. 2. IEEE, 2005.
Lamport, Leslie. ”Password authentication with insecure communication.” Communications of the ACM 24.11 (1981): 770-772.
Yu, Zhen, and Yong Guan. ”A key pre-distribution scheme using deployment knowledge for wireless sensor networks.” Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth International Symposium on. IEEE, 2005.
Camtepe, Seyit A., and Blent Yener. ”Key distribution mechanisms for wireless sensor networks: a survey.” Rensselaer Polytechnic Institute, Troy, New York, Technical Report (2005): 05-07.
El Mouaatamid O, Lahmer M, Belkasmi M. ”A Scalable Group Authentication Scheme Based on Combinatorial Designs with Fault Tolerance for the Internet of Things.” SN Computer Science. 2020 1(4):1-3.
Ruj, Sushmita, and Bimal Roy. ”Key predistribution schemes using codes in wireless sensor networks.” International Conference on Information Security and Cryptology. Springer Berlin Heidelberg, 2008
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Otmane EL MOUAATAMID, Mohamed LAHMER, Mostfa BELKASMI
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright on any article in the International Journal of Engineering and Applied Physics is retained by the author(s) under the Creative Commons license, which permits unrestricted use, distribution, and reproduction provided the original work is properly cited.
License agreement
Authors grant IJEAP a license to publish the article and identify IJEAP as the original publisher.
Authors also grant any third party the right to use, distribute and reproduce the article in any medium, provided the original work is properly cited.