International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

KEMF: Key Management for Federated Sensor Networks

Download
185 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_3,
        author={Piers O’Hanlon and Joss Wright and Ian Brown and Tulio Souza},
        title={KEMF: Key Management for Federated Sensor Networks},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Privacy Security Sensor networks Key management IoT},
        doi={10.1007/978-3-319-23802-9_3}
    }
    
  • Piers O’Hanlon
    Joss Wright
    Ian Brown
    Tulio Souza
    Year: 2015
    KEMF: Key Management for Federated Sensor Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_3
Piers O’Hanlon1,*, Joss Wright1,*, Ian Brown1,*, Tulio Souza1,*
  • 1: University of Oxford
*Contact email: piers.ohanlon@oii.ox.ac.uk, joss.wright@oii.ox.ac.uk, ian.brown@oii.ox.ac.uk, tulio.de.Souza@cs.ox.ac.uk

Abstract

We present a lightweight key management protocol that provides secured device registration and communication in federated sensor networks. The protocol is designed for zero configuration and use in small packet low power wireless networks; protocol messages may fit into single packets. We use the Casper security protocol analyser to examine the behaviour and security properties of the protocol model. Within the assumptions of the model, we demonstrate forward secrecy, security against man-in-the-middle attacks, and local network key protection, comparing favourably with related protocols. Our experimental analysis shows that the protocol may feasibly be deployed on current sensor platforms with 256-bit elliptic curve cryptography.