We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.
- Authors
Faisal, Mohammad; Ali, Ikram; Khan, Muhammad Sajjad; Kim, Junsu; Kim, Su Min
- Abstract
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.
- Subjects
INTERNET of things; WIRELESS sensor networks; AD hoc computer networks; INTERNET security; SECURITY management; WIRELESS Internet; WIRELESS communications
- Publication
Complexity, 2020, p1
- ISSN
1076-2787
- Publication type
Article
- DOI
10.1155/2020/6619498