2020
DOI: 10.1016/j.adhoc.2019.102003
|View full text |Cite
|
Sign up to set email alerts
|

Matrix-based key management scheme for IoT networks

Abstract: The key management is the central element of network security. In fact, key distribution is necessary for securing applications in the context of Internet of Things (IoT). However, existing key management protocols are not directly applicable on IoT due, among other things, to severe and high resource constraints of some devices that make up the IoT network. Therefore, it is necessary that the proposed key management protocols takes in charge these features and constraints. Most existing solutions didn't focus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 19 publications
0
29
0
Order By: Relevance
“…The key exchange phase does not involve any hash computations. The protocols given in Nafi, Bouzefrane & Omar (2020) and Wazid et al (2019) were already proved that they have lower cost and better performance compared to other related schemes. Now, it is proved that the proposed method is having lower cost compared to these two schemes and the same is depicted in Fig.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The key exchange phase does not involve any hash computations. The protocols given in Nafi, Bouzefrane & Omar (2020) and Wazid et al (2019) were already proved that they have lower cost and better performance compared to other related schemes. Now, it is proved that the proposed method is having lower cost compared to these two schemes and the same is depicted in Fig.…”
Section: Resultsmentioning
confidence: 99%
“…In addition to the computational time, overhead of the proposed method was analyzed in terms of cost also. The authentication and key exchange phases were compared with the matrix based scheme in Nafi, Bouzefrane & Omar (2020) and Lightweight Device Authentication and Key Management Scheme (LDAKM) ( Wazid et al, 2019 ). Computational cost of a security scheme is affected by the encryption steps, decryption steps and the hash computation steps used for authentication ( Meulenaer et al, 2008 ; Wander et al, 2005 ).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the highly heterogeneous nature of IoT, ranging from smartphones to smart motion sensors in a smart house context, for instance, traditional authentication schemes based on Public Key Infrastructure (PKI) and certificates, which carry significant processing, memory, storage, communication, and management overheads, are deemed unfit for the devices on the lower end of this range, the resource-constrained IoT devices. Several authentication schemes for IoT especially targeting resource-constrained devices have been proposed as a solution to this problem [Oliveira et al 2009, Simplicio Jr et al 2017, Nafi et al 2020. Albeit authentication differs in concept and purpose from access control, they are indeed closely related security subjects.…”
Section: Introductionmentioning
confidence: 99%
“…Symmetric key-based solutions fall short, such as service access based on the group membership or service type. However, some works (such as [1,2]) consider that public-key cryptography with certificates requires more resources than symmetric key-based solutions. In this context focuses the framework of this work by addressing the resource issue in public-key management in the IoT context.…”
Section: Introductionmentioning
confidence: 99%