Browsing by Author "Bettayeb Sami"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item A robust and efficient vector-based key management scheme for IoT networks(Elsevier, 2023-10-01) Bettayeb Sami; Messai Mohamed Lamine; Hemam Sofiane MounineInformation and communication security is a critical concern in the rapid growth of Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key management is essential to address such networks’ security problems. In this context, several existing research work focuses on key management solutions, which consider the resource-limitation of IoT devices. However, the weaknesses of these solutions are (1) the lack of protection for sensitive parameters during transmission, (2) security and performance metrics’ misbalancing, and (3) the vulnerability to node-compromising attacks. This paper presents a new key management scheme based on pre-distributed vectors to overcome these limits to secure key establishment, refresh, and revocation. Moreover, the network area is divided into subareas, which makes our solution lightweight, flexible, scalable, and resilient to multiple attacks while minimizing communications, computation, and storage overheads on IoT devices. We assess the proposed scheme by using (1) the BAN (Burrows Abadi Needham) formal verification logic, (2) the informal security to demonstrate its resilience against some known attacks, and (3) the performance analysis to prove its correctness. The obtained results show that the proposed scheme is more efficient than other schemes in terms of storage by saving more than 81.84%, communications by 100% during the group-wise key establishment, computation overheads by reducing the number of multiplication operations to 50%, and energy consumption by saving up to 99.99% during the group-wise key establishment phase. Moreover, the results show that our scheme is more resilient against node capture attacks by up to 96.43% during the initialization phase and by more than 9.89% after, making it suitable for use in resource-limited IoT networks.Item BKRSC-IoT: Blockchain-Based Key Revocation Using Smart Contracts for IoT Networks(Springer, Cham, 2024-02-02) Bettayeb Sami; Messai Mohamed Lamine; Hemam Sofiane MounineThe growth of Internet of Things (IoT) networks has brought the crucial need for information and communication security to the fore. Since IoT devices exchange sensitive data, secure key management with its different phases and the key revocation phase especially is essential for IoT network security. However, existing IoT key management solutions need improvements because of the resource limitations of IoT devices. Despite considering these limitations, current key revocation solutions have several areas for improvement, including the high communication overhead of the limited-resource devices. Therefore, there is always a need for a decentralized and efficient solution to address these issues in IoT networks. This paper presents a new solution for key revocation based on Blockchain using smart contracts to minimize the communication overhead and the energy consumption in IoT networks. Furthermore, we assess the correctness of the proposed solution through security and performance analysis. The results show that our solution has reduced the communication overhead by 93,55%, 91,87%, and 99,75% compared to other solutions during the compromising, leaving, and draining cases, respectively, which proves that our solution is efficient and appropriate for IoT networks.