Interoperability, Safety and Security in IoT. Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers

Research Article

On the Performance of Key Pre-distribution for RPL-Based IoT Networks

Download
144 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-52727-7_9,
        author={Ayman El Hajjar and George Roussos and Maura Paterson},
        title={On the Performance of Key Pre-distribution for RPL-Based IoT Networks},
        proceedings={Interoperability, Safety and Security in IoT. Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers},
        proceedings_a={INTERIOT \& SASEIOT},
        year={2017},
        month={2},
        keywords={},
        doi={10.1007/978-3-319-52727-7_9}
    }
    
  • Ayman El Hajjar
    George Roussos
    Maura Paterson
    Year: 2017
    On the Performance of Key Pre-distribution for RPL-Based IoT Networks
    INTERIOT & SASEIOT
    Springer
    DOI: 10.1007/978-3-319-52727-7_9
Ayman El Hajjar1,*, George Roussos1,*, Maura Paterson1,*
  • 1: Birkbeck, University of London
*Contact email: a.elhajjar@bbk.ac.uk, g.roussos@bbk.ac.uk, m.paterson@bbk.ac.uk

Abstract

A core ingredient of the is the use of deeply embedded resource constrained devices, often connected to the Internet over Low Power and Lossy Networks. These constraints compounded by the need for unsupervised operation within an untrusted environment create considerable challenges for the secure operation of these systems. In this paper, we propose a novel method to secure an edge IoT network using the concept of key pre-distribution proposed by Eschenauer and Gligor in the context of distributed sensor networks. First, we investigate the performance of the unmodified algorithm in the Internet of Things setting and then analyse the results with a view to determine its performance and thus its suitability in this context. Specifically, we investigate how ring size influences performance in order to determine the required ring size that guarantees full connectivity of the network. We then proceed to propose a novel and associated metrics that ensure that any node that joins the network can establish secure communication with Internet destinations.