About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

KEMF: Key Management for Federated Sensor Networks

Download(Requires a free EAI acccount)
291 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_3,
        author={Piers O’Hanlon and Joss Wright and Ian Brown and Tulio Souza},
        title={KEMF: Key Management for Federated Sensor Networks},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Privacy Security Sensor networks Key management IoT},
        doi={10.1007/978-3-319-23802-9_3}
    }
    
  • Piers O’Hanlon
    Joss Wright
    Ian Brown
    Tulio Souza
    Year: 2015
    KEMF: Key Management for Federated Sensor Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_3
Piers O’Hanlon1,*, Joss Wright1,*, Ian Brown1,*, Tulio Souza1,*
  • 1: University of Oxford
*Contact email: piers.ohanlon@oii.ox.ac.uk, joss.wright@oii.ox.ac.uk, ian.brown@oii.ox.ac.uk, tulio.de.Souza@cs.ox.ac.uk

Abstract

We present a lightweight key management protocol that provides secured device registration and communication in federated sensor networks. The protocol is designed for zero configuration and use in small packet low power wireless networks; protocol messages may fit into single packets. We use the Casper security protocol analyser to examine the behaviour and security properties of the protocol model. Within the assumptions of the model, we demonstrate forward secrecy, security against man-in-the-middle attacks, and local network key protection, comparing favourably with related protocols. Our experimental analysis shows that the protocol may feasibly be deployed on current sensor platforms with 256-bit elliptic curve cryptography.

Keywords
Privacy Security Sensor networks Key management IoT
Published
2015-12-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23802-9_3
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL