Elliptic curve cryptosystems-based date-constrained hierarchical key management scheme in internet of things

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we propose a new mechanism to improve the disadvantage of the security mechanism proposed by a scholar and then fulfill the demands of Internet of Things (IoT) to go through the decentralized environment access control functions. We also propose the date-constrained hierarchical key management scheme for mobile agents. With elliptic curve cryptosystems (ECCs) and discrete logarithms, the proposed scheme is flexible. Moreover, the duration of access for each security class is restricted with a certain authorized discrete time period. We demonstrate the mathematical derivation and arguments for our scheme and further conduct a numerical trial. The constructed scheme could meet security needs and be more space-efficient.

Cite

CITATION STYLE

APA

Hsiao, T. C., Chen, T. L., Chen, T. S., & Chung, Y. F. (2019). Elliptic curve cryptosystems-based date-constrained hierarchical key management scheme in internet of things. Sensors and Materials, 31(1), 355–364. https://doi.org/10.18494/SAM.2019.2085

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free