Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

03-04-2021

Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things

Authors: Samia Belattaf, Mohamed Mohammedi, Mawloud Omar, Rachida Aoudjit

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) is an emerging paradigm in the world of computer networks, where physical objects are connected over the Internet. Given the huge number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of communication security. Unfortunately, the conventional security methods are hard to adapt due to the heterogeneity and resource-constrained objects. In this paper, we propose a reliable and adaptive distributed public-key management infrastructure for the IoT. The main purpose of our proposal is to mitigate the resource issue for public-key certificate management to design an effective security mechanism, which offers reliable end-to-end security services. In order to evaluate the performances of our proposal, we have conducted intensive simulations with comparison to the literature, in which we have obtained promising results in terms of storage, communication, response time and resilience against malicious nodes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shafagh, H. (2013). Leveraging public-key-based authentication for the Internet of Things. Thesis, RWTH Aachen University, Germany. Shafagh, H. (2013). Leveraging public-key-based authentication for the Internet of Things. Thesis, RWTH Aachen University, Germany.
2.
go back to reference Nafi, M., Bouzefrane, S., & Omar, M. (2020). Matrix-based key management scheme for IoT network. Ad Hoc Networks, 97, 102003.CrossRef Nafi, M., Bouzefrane, S., & Omar, M. (2020). Matrix-based key management scheme for IoT network. Ad Hoc Networks, 97, 102003.CrossRef
3.
go back to reference Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309–329.CrossRef Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309–329.CrossRef
4.
go back to reference Lavanya, S., & Usha, M. (2017). A survey on key management in Internet of Things. In The proceedings of the international conference on intelligent computing systems (pp. 572–580). Lavanya, S., & Usha, M. (2017). A survey on key management in Internet of Things. In The proceedings of the international conference on intelligent computing systems (pp. 572–580).
5.
go back to reference Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, G. (2015). Key management protocol with implicit certificates for IoT systems. In The proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, ACM IoT-Sys’15 (pp. 37–42). Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, G. (2015). Key management protocol with implicit certificates for IoT systems. In The proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, ACM IoT-Sys’15 (pp. 37–42).
6.
go back to reference Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the Internet of Things. Computers and Electrical Engineering, 37(2), 147–159.CrossRef Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the Internet of Things. Computers and Electrical Engineering, 37(2), 147–159.CrossRef
7.
go back to reference Dahshan, H. (2016). An elliptic curve key management scheme for Internet of Things. International Journal of Applied Engineering Research, 11(20), 10241–10246. Dahshan, H. (2016). An elliptic curve key management scheme for Internet of Things. International Journal of Applied Engineering Research, 11(20), 10241–10246.
8.
go back to reference Tsai, I. C., Yu, C. M., Yokota, H., & Kuo, S. Y. (2017). Key management in Internet of Things via kronecker product. In The proceedings of the IEEE 22nd Pacific Rim international symposium on dependable computing (PRDC) (pp. 118–124). Tsai, I. C., Yu, C. M., Yokota, H., & Kuo, S. Y. (2017). Key management in Internet of Things via kronecker product. In The proceedings of the IEEE 22nd Pacific Rim international symposium on dependable computing (PRDC) (pp. 118–124).
9.
go back to reference Ben Saied, Y., Olivereau, A., Zeghlache, D., & Laurent, M. (2014). Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks, 64, 273–295.CrossRef Ben Saied, Y., Olivereau, A., Zeghlache, D., & Laurent, M. (2014). Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks, 64, 273–295.CrossRef
10.
go back to reference Veltri, L., Cirani, S., Busanelli, S., & Ferrari, G. (2013). A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Networks, 11(8), 2724–2737.CrossRef Veltri, L., Cirani, S., Busanelli, S., & Ferrari, G. (2013). A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Networks, 11(8), 2724–2737.CrossRef
11.
go back to reference Wong, C. K., Gouda, M., & Lam, S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1), 16–30.CrossRef Wong, C. K., Gouda, M., & Lam, S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1), 16–30.CrossRef
12.
go back to reference Gu, H., & Potkonjak, M. (2018). Efficient and secure group key management in IoT using multistage interconnected PUF. In The proceedings of the international symposium on low power electronics and design (pp. 1–6). Gu, H., & Potkonjak, M. (2018). Efficient and secure group key management in IoT using multistage interconnected PUF. In The proceedings of the international symposium on low power electronics and design (pp. 1–6).
13.
go back to reference Hoglund, J., Lindemer, S., Furuhed, M., & Raza, S. (2020). PKI4IoT: Towards public key infrastructure for the Internet of Things. Computers and Security, 89, 1–16.CrossRef Hoglund, J., Lindemer, S., Furuhed, M., & Raza, S. (2020). PKI4IoT: Towards public key infrastructure for the Internet of Things. Computers and Security, 89, 1–16.CrossRef
14.
go back to reference Braeken, A., Liyanage, M., & Jurcut, A. D. (2019). Anonymous lightweight proxy based key agreement for IoT (ALPKA). Wireless Personal Communications, 106(2), 345–364.CrossRef Braeken, A., Liyanage, M., & Jurcut, A. D. (2019). Anonymous lightweight proxy based key agreement for IoT (ALPKA). Wireless Personal Communications, 106(2), 345–364.CrossRef
15.
go back to reference Tabassum, T., Hossain, S. A., Rahman, M. A., Alhamid, M. F., & Hossain, M. A. (2020). An efficient key management technique for the Internet of Things. Sensors, 20(7), 20–49.CrossRef Tabassum, T., Hossain, S. A., Rahman, M. A., Alhamid, M. F., & Hossain, M. A. (2020). An efficient key management technique for the Internet of Things. Sensors, 20(7), 20–49.CrossRef
16.
go back to reference Guerrieri, A. (2016). Distributed graph algorithms. Presentation slides. Trento: University of Trento. Guerrieri, A. (2016). Distributed graph algorithms. Presentation slides. Trento: University of Trento.
Metadata
Title
Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things
Authors
Samia Belattaf
Mohamed Mohammedi
Mawloud Omar
Rachida Aoudjit
Publication date
03-04-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08437-9

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue