Abstract

Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.

Highlights

  • In communication technologies, a novel prototype for Internet of ings is grooming rapidly and effectively around the world. e future Internet, designed as an “Internet of ings,” is foreseen to be “a world-wide network of interconnected objects uniquely addressable, based on standard communication protocols” [1]

  • We explored and evaluated various schemes with respect to the achieved services and attacks counteracted in Mobile ad hoc networks (MANETs), Wireless Sensor Networks (WSNs), and Internet of ings

  • We concluded that confidentiality, integrity, and authentication services are comparatively best controlled by identity-based key management schemes, while the denial of service attacks are resisted effectively by threshold-based key management schemes [9, 10, 22, 23]

Read more

Summary

Introduction

A novel prototype for Internet of ings is grooming rapidly and effectively around the world. e future Internet, designed as an “Internet of ings,” is foreseen to be “a world-wide network of interconnected objects uniquely addressable, based on standard communication protocols” [1]. E future Internet, designed as an “Internet of ings,” is foreseen to be “a world-wide network of interconnected objects uniquely addressable, based on standard communication protocols” [1]. That everything (static/dynamic) anytime around us can connect with each other to communicate/exchange information and effectively [1]. Internet of ings defines a dedicated field named key identifier module to implement key management schemes implicitly. E field consists of two parts: key source and key index, respectively. Internet of ings defines a dedicated field named key identifier module to implement key management schemes implicitly. e field is compatible to implement single keys, group keys, pairwise keys, and digital certificate keys as well. e field consists of two parts: key source and key index, respectively. e first part, key source, presents the origin of the key while the second

Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call