2019
DOI: 10.1109/access.2019.2900957
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

Abstract: The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others. The explosive growth of Internet-connected sensing and actuating devices has bridged the gap between the physical and the digital world, with new solutions bringing benefits to people, processes, and businesses. However, security will be a major challenge in enabling most of such applica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
49
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(49 citation statements)
references
References 91 publications
0
49
0
Order By: Relevance
“…There will be many restrictions for smart toy's hardware so they have presented a specific encryption methodology that proved to provide secure solution for the sensitive IoT environment. In [5], they have proposed a methodology with three phases of security. The first phase handles non interfered messages of light weight data.…”
Section: Literature Surveymentioning
confidence: 99%
“…There will be many restrictions for smart toy's hardware so they have presented a specific encryption methodology that proved to provide secure solution for the sensitive IoT environment. In [5], they have proposed a methodology with three phases of security. The first phase handles non interfered messages of light weight data.…”
Section: Literature Surveymentioning
confidence: 99%
“…I NTERNET of things (IoT) are broadly defined as a network of "things" interfaced with the internet [1]- [3]. "Things" here could imply a collection of electronic devices or sensors, and subsystems working in synergy.…”
Section: Introductionmentioning
confidence: 99%
“…One approach to counter the wireless and attachment vulnerabilities is to assign a cryptographically secure identifier to all IoT devices already before deployment, e.g., at the manufacturing time. If these preconfigured identifiers are then configured at the system side before a device is deployed, already the initial connection between a new device and the rest of the system can be secured [ 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%