Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

Complexity 2020:1-9 (2020)
  Copy   BIBTEX

Abstract

Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Ethical Aspects of the Internet of Things in eHealth.Kashif Habib - 2014 - International Review of Information Ethics 22:83-91.
Role of Fog Computing in the Internet of Things.Narendra Rao Tadapaneni - 2019 - International Journal of Scientific Research and Engineering Trends 5 (6).
Ethical Consequences of Bounded Rationality in the Internet of Things.Sandrina Dimitrijevic - 2014 - International Review of Information Ethics 22:74-82.
Internet Capital.Russell Hardin - 2004 - Analyse & Kritik 26 (1):122-138.
A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
Towards inclusive identity management.Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim - 2010 - Identity in the Information Society 3 (3):515-538.

Analytics

Added to PP
2020-12-22

Downloads
12 (#1,062,297)

6 months
6 (#512,819)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Muhammad Khan
University of Leicester

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references