ABSTRACT
Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still open. The existing solutions are mainly based on encryption techniques, but no attention is actually paid to key management. A clever key distribution system, along with a key replacement mechanism, are essentials for assuring a secure approach. In this paper, two popular key management systems, conceived for wireless sensor networks, are integrated in a real IoT middleware and compared in order to evaluate their performance in terms of overhead, delay and robustness towards malicious attacks.
- M. R. Abdmeziem and D. Tandjaoui. An end-to-end secure key management protocol for e-health applications. Computers&Electrical Engineering, 44, 2015. Google ScholarDigital Library
- R. Di Pietro, L. Mancini, and S. Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Netw., 1.Google Scholar
- G. Dini and L. Lopriore. Key propagation in wireless sensor networks. Computers&Electrical Engineering, 41, 2015. Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In 9th ACM Conference on Computer and Communications Security, 2002. Google ScholarDigital Library
- K. T. Nguyen, M. Laurent, and N. Oualha. Survey on secure communication protocols for the internet of things. Ad Hoc Netw., 32, 2015. Google ScholarDigital Library
- S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Comp. Netw., 76, 2015. Google ScholarDigital Library
- S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and A. Coen-Porisini. A secure and quality-aware prototypical architecture for the internet of things. Information Systems, 58, 2016.Google Scholar
- M. A. Simplício, P. S. Barreto, C. B. Margi, and T. C. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54. Google ScholarDigital Library
- L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari. A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw., 11. Google ScholarDigital Library
- H. Yu, J. He, T. Zhang, and P. Xiao. A group key distribution scheme for wireless sensor networks in the internet of things scenario. International Journal of Distributed Sensor Networks, 2012, 2012.Google Scholar
Index Terms
- Internet of Things: Security in the Keys
Recommendations
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...
Survey on secure communication protocols for the Internet of Things
The Internet of Things or "IoT" defines a highly interconnected network of heterogeneous devices where all kinds of communications seem to be possible, even unauthorized ones. As a result, the security requirement for such network becomes critical ...
Taxonomy and analysis of security protocols for Internet of Things
AbstractThe Internet of Things (IoT) is a system of physical as well as virtual objects (each with networking capabilities incorporated) that are interconnected to exchange and collect information locally or remotely over the Internet. Since ...
Highlights- We first discuss essential security requirements that are needed to secure IoT environment. We also discuss the threat model and various attacks related to ...
Comments