Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2988272.2988280acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
short-paper

Internet of Things: Security in the Keys

Published: 13 November 2016 Publication History

Abstract

Security threats may hinder the large scale adoption of the emerging Internet of Things (IoT) technologies. Besides efforts have already been made in the direction of data integrity preservation, confidentiality and privacy, several issues are still open. The existing solutions are mainly based on encryption techniques, but no attention is actually paid to key management. A clever key distribution system, along with a key replacement mechanism, are essentials for assuring a secure approach. In this paper, two popular key management systems, conceived for wireless sensor networks, are integrated in a real IoT middleware and compared in order to evaluate their performance in terms of overhead, delay and robustness towards malicious attacks.

References

[1]
M. R. Abdmeziem and D. Tandjaoui. An end-to-end secure key management protocol for e-health applications. Computers&Electrical Engineering, 44, 2015.
[2]
R. Di Pietro, L. Mancini, and S. Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Netw., 1.
[3]
G. Dini and L. Lopriore. Key propagation in wireless sensor networks. Computers&Electrical Engineering, 41, 2015.
[4]
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In 9th ACM Conference on Computer and Communications Security, 2002.
[5]
K. T. Nguyen, M. Laurent, and N. Oualha. Survey on secure communication protocols for the internet of things. Ad Hoc Netw., 32, 2015.
[6]
S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Comp. Netw., 76, 2015.
[7]
S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and A. Coen-Porisini. A secure and quality-aware prototypical architecture for the internet of things. Information Systems, 58, 2016.
[8]
M. A. Simplício, P. S. Barreto, C. B. Margi, and T. C. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54.
[9]
L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari. A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw., 11.
[10]
H. Yu, J. He, T. Zhang, and P. Xiao. A group key distribution scheme for wireless sensor networks in the internet of things scenario. International Journal of Distributed Sensor Networks, 2012, 2012.

Cited By

View all
  • (2024)Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and ChallengesIEEE/CAA Journal of Automatica Sinica10.1109/JAS.2023.12387011:1(58-73)Online publication date: Jan-2024
  • (2023)Security concerns over IoT routing using emerging technologiesTransactions on Emerging Telecommunications Technologies10.1002/ett.479834:7Online publication date: 11-Jul-2023
  • (2022)SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc NetworksSensors10.3390/s2211401922:11(4019)Online publication date: 26-May-2022
  • Show More Cited By

Index Terms

  1. Internet of Things: Security in the Keys

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Q2SWinet '16: Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks
    November 2016
    148 pages
    ISBN:9781450345040
    DOI:10.1145/2988272
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. internet of things
    2. key management
    3. prototype
    4. security

    Qualifiers

    • Short-paper

    Conference

    MSWiM '16
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 46 of 131 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and ChallengesIEEE/CAA Journal of Automatica Sinica10.1109/JAS.2023.12387011:1(58-73)Online publication date: Jan-2024
    • (2023)Security concerns over IoT routing using emerging technologiesTransactions on Emerging Telecommunications Technologies10.1002/ett.479834:7Online publication date: 11-Jul-2023
    • (2022)SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc NetworksSensors10.3390/s2211401922:11(4019)Online publication date: 26-May-2022
    • (2022)Home quarantine patient monitoring in the era of COVID-19 diseaseSmart Health10.1016/j.smhl.2021.10022223(100222)Online publication date: Mar-2022
    • (2022)Securing the access control policies to the Internet of Things resources through permissioned blockchainConcurrency and Computation: Practice and Experience10.1002/cpe.693434:15Online publication date: 12-Mar-2022
    • (2020)Block Data Record-Based Dynamic Encryption Key Generation Method for Security between Devices in Low Power Wireless Communication Environment of IoTApplied Sciences10.3390/app1021794010:21(7940)Online publication date: 9-Nov-2020
    • (2020)Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security2020 IEEE International Conference on Smart Internet of Things (SmartIoT)10.1109/SmartIoT49966.2020.00019(64-71)Online publication date: Aug-2020
    • (2020)A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT NetworkWireless Personal Communications10.1007/s11277-020-07466-0Online publication date: 27-May-2020
    • (2020)Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT EnvironmentAd-Hoc, Mobile, and Wireless Networks10.1007/978-3-030-61746-2_14(183-197)Online publication date: 15-Oct-2020
    • (2019)Towards secure 5G networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2019.106871162:COnline publication date: 24-Oct-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media