Javascript must be enabled to continue!
A novel communication‐aware adaptive key management approach for ensuring security in IoT networks
View through CrossRef
AbstractInternet of Things (IoT) encompasses heterogeneous communication devices and wireless technologies to provide ubiquitous access using end‐user devices. It operates on a common website for connecting versatile devices with seamless communication, data access and sharing. Communication through wireless medium requires enormous security features to protect both public and private data across different interconnected resources. Therefore, in this article, a communication‐aware adaptive key management (CAKM) is proposed to ensure two levels of security in IoT communication. The two‐levels of security include both device and message that is facilitated using certificate authority and key management. By exploiting the benefits of hyper elliptic curve cryptography (HECC), the communication‐aware adaptive key management ensures message authentication for the device requests. Initially, the device requests are classified on the basis of its service time and correlated to the time‐to‐live period of the certificate. The proposed method attains low computational time 10.9%, 30.2%, and 54.3%, high security level 10.9%, 30.2%, and 54.3%, high successful message rate 10.9%, 30.2%, and 54.3% and low key agreement time 10.9%, 30.2%, and 54.3% when compared to the three existing methods, such as bilateral generalization inhomogeneous short integer solution (Bi‐GISIS)‐based key management in IoT security (Bi‐GISIS‐IoT), hyper elliptic curve based public key cryptosystem in IoT security (HCCPK‐IoT) and enhanced symmetric key‐based authentication in IoT security (ESKA‐IoT). Finally, the proposed method provides an efficient security with low computational time.
Title: A novel communication‐aware adaptive key management approach for ensuring security in IoT networks
Description:
AbstractInternet of Things (IoT) encompasses heterogeneous communication devices and wireless technologies to provide ubiquitous access using end‐user devices.
It operates on a common website for connecting versatile devices with seamless communication, data access and sharing.
Communication through wireless medium requires enormous security features to protect both public and private data across different interconnected resources.
Therefore, in this article, a communication‐aware adaptive key management (CAKM) is proposed to ensure two levels of security in IoT communication.
The two‐levels of security include both device and message that is facilitated using certificate authority and key management.
By exploiting the benefits of hyper elliptic curve cryptography (HECC), the communication‐aware adaptive key management ensures message authentication for the device requests.
Initially, the device requests are classified on the basis of its service time and correlated to the time‐to‐live period of the certificate.
The proposed method attains low computational time 10.
9%, 30.
2%, and 54.
3%, high security level 10.
9%, 30.
2%, and 54.
3%, high successful message rate 10.
9%, 30.
2%, and 54.
3% and low key agreement time 10.
9%, 30.
2%, and 54.
3% when compared to the three existing methods, such as bilateral generalization inhomogeneous short integer solution (Bi‐GISIS)‐based key management in IoT security (Bi‐GISIS‐IoT), hyper elliptic curve based public key cryptosystem in IoT security (HCCPK‐IoT) and enhanced symmetric key‐based authentication in IoT security (ESKA‐IoT).
Finally, the proposed method provides an efficient security with low computational time.
Related Results
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Analysis and Development of Security Framework for IOT Device
Analysis and Development of Security Framework for IOT Device
Internet of Things (IoT) devices are growing rapidly, making security and privacy crucial. This study analyses and develops an IoT-specific security framework. To address the speci...
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. ...
Applications of Ontology in the Internet of Things: A Systematic Analysis
Applications of Ontology in the Internet of Things: A Systematic Analysis
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and obj...
Research on Communication Network Security Based on Narrowband Internet of Things and Encryption Algorithms
Research on Communication Network Security Based on Narrowband Internet of Things and Encryption Algorithms
With the rapid development of Internet of Things (IoT) technology, Narrowband IoT (NB-IoT) has been widely adopted in smart cities, smart homes, and industrial automation due to it...
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
In the era of globalization, Internet of Things (IoT) technology has changed the way information is disseminated and accessed, including in the context of spreading Islam. This stu...
DECENTRALIZED IOT-BASED ARCHITECTURES FOR TAMPER-PROOF AGRICULTURAL SENSOR NETWORKS: ENSURING END-TO-END DATA INTEGRITY AND TRANSPARENT GOVERNANCE
DECENTRALIZED IOT-BASED ARCHITECTURES FOR TAMPER-PROOF AGRICULTURAL SENSOR NETWORKS: ENSURING END-TO-END DATA INTEGRITY AND TRANSPARENT GOVERNANCE
As communication technologies evolve, the IoT has transitioned from nascent development to near maturity, driving exponential growth in data transmission and processing. This advan...

