The Procedure of Key Distribution in Military IoT Networks.

Communications in Computer and Information Science(2019)

引用 5|浏览12
暂无评分
摘要
Cryptographic key distribution is a critical stage in the implementation of network security in the Military IoT (MIoT). In MIoT, due to the resource-constrained nature of the nodes, it is important to design a key management protocol with minimum resource overhead. The proposed procedure uses asymmetric and symmetric cryptography and reduces the memory requirement. The efficient Quantis Random Number Generator is used to provide symmetric keys with full entropy. The method of delivering symmetric keys (so-called session keys) to nodes wishing to implement a safety data exchange was presented. During simulation studies of the ZigBee network, the average energy consumption for the coordinator, single router and end node participating in the encryption key distribution process was estimated. Simulation tests for the ZigBee network were prepared and implemented in the Riverbed Modeler environment.
更多
查看译文
关键词
Asymmetric and symmetric cryptography,Military IoT,Quantis Random Number Generator
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要