Mid Sweden University

miun.sePublications
System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. (Communication Systems and Networks (CSN))
The Polytechnic of Porto (IPP), Portugal.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. (Communication Systems and Networks (CSN))ORCID iD: 0000-0003-0873-7827
2019 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 1, p. 906-917Article in journal (Refereed) Published
Abstract [en]

The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements such as increasing production flexibility, self-organization and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast re-keying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the Gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-the-art key-exchange protocols, to show our protocol reliability for IIoT.

Place, publisher, year, edition, pages
2019. Vol. 6, no 1, p. 906-917
Keywords [en]
Industrial Internet of Things (IIoT), Cyber Assurance, Key Distribution Protocol.
National Category
Communication Systems Telecommunications Computer Engineering Computer Sciences
Identifiers
URN: urn:nbn:se:miun:diva-34278DOI: 10.1109/JIOT.2018.2865212ISI: 000459709500077Scopus ID: 2-s2.0-85051650298OAI: oai:DiVA.org:miun-34278DiVA, id: diva2:1240049
Projects
TIMELINESSSMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Funder
European Regional Development Fund (ERDF)Knowledge FoundationAvailable from: 2018-08-20 Created: 2018-08-20 Last updated: 2019-10-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Eldefrawy, MohamedGidlund, Mikael

Search in DiVA

By author/editor
Eldefrawy, MohamedGidlund, Mikael
By organisation
Department of Information Systems and Technology
In the same journal
IEEE Internet of Things Journal
Communication SystemsTelecommunicationsComputer EngineeringComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 675 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf