ENCRYPTION KEY MANAGEMENT IN A WIRELESS MESH NETWORK

2024;
: pp. 37-42
1
Lviv Polytechnic National University, Ukraine
2
Lviv Polytechnic National University

Wireless MESH networks are important for providing communication in conditions where communication infrastructure is limited or absent. In such networks, encryption key management plays an important role in ensuring the security of data transmission. The work analyzes existing approaches to encryption key management in wireless networks and proposes a method for optimal key update. The method was tested on the LoRa EBYTE SX1262 chip with the ESP-WROOM-32. Algorithms for predicting update time were used.

  1. Hoa, L. V., & Vinh, T. Q. Real-time Key Management for Wireless Mesh Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), Vol. 10 No. 2-6, 2018, pp.13–18. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4362
  2. Gianni D’Angelo, Francesco Palmieri. A hound-inspired pre-hybridized genetic approach for router placement in wireless mesh networks. Applied Soft Computing. Vol 166, 2024, р.112159, doi.org/10.1016/j.asoc.2024.112159
  3. R. Imam, Q.M. Areeb, A. Alturki, F. Anwer Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access, 9, 2021, pp. 155949-155976, doi.org/10.1109/ACCESS.2021.3129224
  4. Abdmeziem, M. R., & Ahmed Nacer, A., & Deroues, N.M. Group key management in the Internet of Things: Handling asynchronicity. Future Generation Computer Systems, Volume 152, 2024, pp. 273-287, doi.org/10.1016/j.future.2023.10.023
  5. Bruno Ramos-Cruz, JavierAndreu-Perez, Luis Martínez. The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. Neurocomputing. Volume 581, р.1274277, 2024, doi.org/10.1016/j.neucom.2024.127427
  6. Osama A. Khashan a, Rami Ahmad b, Nour M. Khafajah. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks. Vol 115, 2021, р. 102448, doi.org/10.1016/j.adhoc.2021.102448
  7. Abdmeziem, M. R., & Ahmed Nacer, A., & Deroues, N.M (2024). Group key management in the Internet of Things: Handling asynchronicity. Future Generation Computer Systems, Volume 152, pp. 273-287, doi.org/10.1016/ j.future.2023.10.023
  8. Xueping Yan, Lin Tan, Hong Xu, Wenfeng Qi. Improved mixture differential attacks on 6-round AES-like ciphers towards  time  and  data  complexities.  Journal  of Information Security and Applications,Volume 80, 2024, р. 103661, doi.org/10.1016/j.jisa.2023.103661
  9. Miguel Antonio Caraveo-Cacep a b 1, Rubén Vázquez- Medina a 1, Antonio Hernández Zavala. A survey on low- cost development boards for applying cryptography in IoT systems. Internet of Things. Vol 22, 2023, р. 100743, doi.org/10.1016/j.iot.2023.100743.
  10. Antonio Muñoz, Ruben Ríos, Rodrigo Román, Javier López. A survey on the (in) security of trusted execution environments. Computers & Security. Vol129, 2023, 103180, doi.org/10.1016/j.cose.2023.103180
  11. Kendall Niles a, Jason Ray a, Kenneth Niles a, Andrew Maxwell a, Anton Netchaev. Monitoring for Analytes through LoRa and LoRaWAN Technology. Procedia Computer Science. Vol 185, 2021, pp. 152-159, doi.org/10.1016/j.procs.2021.05.041
  12. Inc, Atecc608a, secure element to secure authentication. Accessed on 27.10.2022. www.microchip.com/en- us/product/ATECC608A
  13.  Yasmeen Shaher Alslman1, Ashraf Ahmad1, Yousef AbuHour. Enhanced and authenticated cipher block chaining mode. Bulletin of Electrical Engineering and Informatics. Vol.12(4), 2023, pp. 2357-2362 doi:10.11591/beei.v12i4.5113
  14. R. Imam, Q.M. Areeb, A. Alturki, F. Anwer Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access, 9, 2021, pp. 155949-155976, doi.org/10.1109/ACCESS.2021.3129224
  15. Nil Llisterri Giménez, Joan Miquel Solé, Felix Freitag. Embedded federated learning over a LoRa mesh network. Pervasive and Mobile Computing. Vol 93, 2023, р.101819, doi.org/10.1016/j.pmcj.2023.101819
  16. Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Chuan-Tian Wu. Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment. Computers, Materials and Continua. Vol 73, №1, 2022, pp. 547-562, doi.org/10.32604/cmc.2022.026557
  17. S. Anbazhagan, R.K. Mugelan. Next-gen resource opti- mization in NB-IoT networks: Harnessing soft actor–critic reinforcement learning. Computer Networks. Vol 252, 2024, р.110670, doi.org/10.1016/j.comnet.2024.110670