A secure key management technique through distributed middleware for the internet of things

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things has made dramatic change in our life. Consumer, governmental and business trends are pushing us towards the IoT. 1.9 billion devices are being used today, and more than 50 billion will be used by 2020. So with the increase of internet connected devices, there is an increasing need for strong security measures. The sensors are manufactured by different companies with different processing power. In this huge number of low power sensors how the data will be protected from different attacks? As IoT data need to transit through different gateways and cloud to reach its final destination so what will happen if any attacker change the data or in any other way take the control and destroy the whole system. Our main target is to ensure a protected and secure IoT by introducing a secure key exchange mechanism, along with a key replacement process. As from our initial experimentation, we found out that the proposed approach of distributed key management technique is appealing and performing good with respect to several factors like robustness, delay, overhead, malicious attacks, etc.

Cite

CITATION STYLE

APA

Tabassum, T., Hossain, S. A., & Rahman, M. A. (2019). A secure key management technique through distributed middleware for the internet of things. In Advances in Intelligent Systems and Computing (Vol. 858, pp. 1128–1139). Springer Verlag. https://doi.org/10.1007/978-3-030-01174-1_86

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free