Security Level Key Management Methodologies in IoT mode operations

Authors

  • Arun Ganji, D. Usha

Keywords:

Security Goals , IoT Security, Key Management, Key Generation, Key Distribution, Modes of Operations, Map Link, IoT Challenges.

Abstract

Web of Things i.e IOT has given accepting an open door to fabricate strong frameworks and levels. Reliability is the principal worry in Internet of things supplication because of the protection of traded information passing on universal object interaction administrations utilizing restricted assets of object gadgets. From this Proposal as it goes input characterization of Universal object interaction (IOT).methods of activity in light of the conveyance of IoT gadgets, availability to the web, and common field of supplication. To give protection, the administration of clue for open is fundamental. At this paper, As we come across different clue administration conventions concerning IoT which be designated in lattice map connect. The guide data is connecting between methods of activity and the related reliable clue admin components. The principal focus of this planning format data for originators in choosing the ideal security method that gives the higher split the difference between the necessary security level & IoT framework mode requirements.

Downloads

Download data is not yet available.

References

J. Sathish Kumar , Dhiren R. Patel ,” A Survey on Internet of Things: Security and Privacy Issues”, International Journal of Computer Applications (0975 – 8887), Volume 90 – No 11, March 2014.

Somayya Madakam, R. Ramaswamy, Siddharth Tripathi,” Internet of Things (IoT): A Literature Review”, Journal of Computer and Communications, India, Volume 3, Pages 164- 173, January 2015.

Chris Folk, MITRE, Dan C.Hurley, “The security implications of the Internet of Things”,AFCEA International Cyber Committee, February 2015.

Inayat Ali*1, Sonia Sabir1, Zahid Ullah, “Internet of Things Security, Device Authentication and Access Control: A Review”, (IJCSIS) International Journal of Computer Science and Information Security,Pakistan , Vol 14, No 8, August 2016.

Jorge Granjal, Edmundo Monteiro, and Jorge Sá Silva,” Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”, IEEE communication University (ICU), page no. 305- 732,Korea,2000

Ramaswamy Chandramouli , Michaela Iorga , Santosh Chokhani,” Cryptographic Key Management Issues & Challenges in Cloud Services’, National Institute of Standards and Technology Interagency or Internal Report 7956 (NISTIR) , September 2013.

Manikandan G1, Sakthi U2, “A Comprehensive Survey on Various key Management Schemes in WSN”, Second International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2018) IEEE Xplore Part Number:CFP18OZV ART, ISBN:978-1-5386-1442-6, India, 2018.

Christof Paar et al., Understanding Cryptography © Springer-Verlag Berlin Heidelberg 2010, Pages 331-357

Chapter 13,Key Establishment George Margelis , Xenofon Fafoutis, George Oikonomou , Robert Piechocki , Theo Tryfonas , Paul Thomas, “Efficient DCT-based secret key generation for the Internet of Things “, Ad Hoc Networks 92 (2019) 101744 , Denmark, August 2018.

Janusz Furtak, “Cryptographic Keys Generating and Renewing system for IoT Network Nodes-A Concept”, Sensors 2020, 20, 5012; doi:10.3390/s20175012 ,Poland , Septemper 2020

Boyeon Song and Kwangjo Kim, “Comparison of Existing Key Establishment Protocols”, Information and Communications University (ICU), page no. 305-732, Korea, 2000.

Wen-Chung Tsai, Tzu-Hsuan Tsai, Guang Hao Xiao, Te-Jen Wang, Yu-Ruei Lian, Song□Hao Huang,” An Automatic Key-update Mechanism for M2M Communication and IoT Security Enhancement”, 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), Tiawan , 2020.

Mohammad Wazid 1 , Ashok Kumar Das 2 , Sachin Shetty 3 , Joel J. P. C. Rodrigues 4,5 and Youngho Park,” LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge Based IoT Deployment”, Sensors 2019, 19, 5539; doi:10.3390/s19245539,2019.

Mohamed H. Eldefrawy, Nuno Pereira and Mikael Gidlund,” Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates”, Citation information: DOI 10.1109/JIOT.2018.2865212, IEEE Internet of Things Journal,2018.

Bashar Alohali*, Kashif Kifayat, Qi Shi, William Hurst,” A Survey on Cryptography Key Management Schemes for Smart Grid” Journal of Computer Sciences and Applications, 2015, Vol.3, No. 3A,27-39 , United Kingdom,2015.

Chandrasegar Thirumalai, Himanshu Kar,” Memory Efficient Multi Key (MEMK) Generation Scheme for Secure Transportation of Sensitive Data over Cloud and IoT Devices”, International Conference on Innovations in Power and Advanced Computing Technologies [i- PACT2017],India , 2017

I.V. Chugunkov1, O.Уu. Novikova, V.A. Perevozchikov, S.S. Troitskiy,” The Development and Researching of Lightweight Pseudorandom Number Generators”, IEEE , Russian, 2016.

Fangmin Sun, Weilin Zang, Haohua Huang, Ildar Farkhatdinov and Ye Li,” Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices”, Citation information: DOI 10.1109/JIOT.2020.3014646, IEEE Internet of Things Journal,2021.

Federico Concone, Giuseppe Lo Re and Marco Morana,” SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications”, Concone et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:28, Italy, 2020.

Maissa Dammak1, Sidi Mohammed Senouci1, Mohamed Ayoub Messous1, Mohamed Houcine Elhdhili2, Christophe Gransart3, “Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments”, IEEE Transactions on Network and Service Management, June 2020.

Akbar Morshed Aski1 · Hamid Haj Seyyed Javadi2 , Gholam Hassan Shirdel3,” A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network”, Wireless Personal Communications, Iran, MAY 2020.

Daemin Shini,2, Keon Yuni,Jiyoon Kini,Philip Virgil Astillo1,Jeong-Nyeo Kim3,And Ilsun You1,”A Security Protocol for Route Optimization in DMM- Based Smart Home IoT Networks”, special section on security and privacy in emerging decentralized communication environments, South Korea , 2019.

Downloads

Published

24.03.2024

How to Cite

D. Usha, A. G. . (2024). Security Level Key Management Methodologies in IoT mode operations. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1305–1314. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5521

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.