A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach

A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach

Vinod Vijaykumar Kimbahune, Arvind V. Deshpande, Parikshit N. Mahalle
Copyright: © 2018 |Volume: 9 |Issue: 1 |Pages: 30
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781522545088|DOI: 10.4018/IJISMD.2018010105
Cite Article Cite Article

MLA

Kimbahune, Vinod Vijaykumar, et al. "A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach." IJISMD vol.9, no.1 2018: pp.92-121. http://doi.org/10.4018/IJISMD.2018010105

APA

Kimbahune, V. V., Deshpande, A. V., & Mahalle, P. N. (2018). A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach. International Journal of Information System Modeling and Design (IJISMD), 9(1), 92-121. http://doi.org/10.4018/IJISMD.2018010105

Chicago

Kimbahune, Vinod Vijaykumar, Arvind V. Deshpande, and Parikshit N. Mahalle. "A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 92-121. http://doi.org/10.4018/IJISMD.2018010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The computational complexity of the next generation internet (NGI) is increasing at a faster rate. Due to the large scale of ubiquitous devices, effective and secure communication and addressing mechanism is vulnerable to several threats. Apart from resource constraints of the devices, the unknown topology of the network and the higher risk of device capture make the key management a more challenging task in NGI. In this context, a novel attack resistant and salable key management scheme must be in place to enable end-to-end secure communication. In the first part of the article, is a detailed analysis of various threats along with behavioral modeling of attack. Further, this article presents comprehensive literature survey and the gap analysis. The proposed key management scheme has been evaluated in two scenarios viz. centralized and decentralized and its formal security analysis also proves that it is safe from replay attack. The proposed key management scheme has been evaluated with a performance metric like delay and the results shows that it is salable in nature.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.