Efficient end-to-end secure key management protocol for internet of things

14Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.

References Powered by Scopus

Kerberos: An Authentication Service for Computer Networks

938Citations
N/AReaders
Get full text

Interconnecting Smart Objects with IP

345Citations
N/AReaders
Get full text

Lithe: Lightweight secure CoAP for the internet of things

333Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A reliable next generation cyber security architecture for industrial internet of things environment

33Citations
N/AReaders
Get full text

SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation

21Citations
N/AReaders
Get full text

A comprehensive survey on exiting solution approaches towards security and privacy requirements of IoT

12Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Slimane, Y. B., & Ahmed, K. B. (2017). Efficient end-to-end secure key management protocol for internet of things. International Journal of Electrical and Computer Engineering, 7(6), 3622–3631. https://doi.org/10.11591/ijece.v7i6.pp3622-3631

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

77%

Lecturer / Post doc 2

15%

Researcher 1

8%

Readers' Discipline

Tooltip

Computer Science 9

69%

Business, Management and Accounting 2

15%

Social Sciences 1

8%

Engineering 1

8%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free