skip to main content
10.1145/2988272.2988280acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
short-paper

Internet of Things: Security in the Keys

Published:13 November 2016Publication History

ABSTRACT

Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still open. The existing solutions are mainly based on encryption techniques, but no attention is actually paid to key management. A clever key distribution system, along with a key replacement mechanism, are essentials for assuring a secure approach. In this paper, two popular key management systems, conceived for wireless sensor networks, are integrated in a real IoT middleware and compared in order to evaluate their performance in terms of overhead, delay and robustness towards malicious attacks.

References

  1. M. R. Abdmeziem and D. Tandjaoui. An end-to-end secure key management protocol for e-health applications. Computers&Electrical Engineering, 44, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Di Pietro, L. Mancini, and S. Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Netw., 1.Google ScholarGoogle Scholar
  3. G. Dini and L. Lopriore. Key propagation in wireless sensor networks. Computers&Electrical Engineering, 41, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In 9th ACM Conference on Computer and Communications Security, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. T. Nguyen, M. Laurent, and N. Oualha. Survey on secure communication protocols for the internet of things. Ad Hoc Netw., 32, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Comp. Netw., 76, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and A. Coen-Porisini. A secure and quality-aware prototypical architecture for the internet of things. Information Systems, 58, 2016.Google ScholarGoogle Scholar
  8. M. A. Simplício, P. S. Barreto, C. B. Margi, and T. C. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari. A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw., 11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Yu, J. He, T. Zhang, and P. Xiao. A group key distribution scheme for wireless sensor networks in the internet of things scenario. International Journal of Distributed Sensor Networks, 2012, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Internet of Things: Security in the Keys

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      Q2SWinet '16: Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks
      November 2016
      148 pages
      ISBN:9781450345040
      DOI:10.1145/2988272

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 November 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate46of131submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader