Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim
Format: Article
Language:English
Published: Wiley 2020-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2020/6619498
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832568511516377088
author Mohammad Faisal
Ikram Ali
Muhammad Sajjad Khan
Junsu Kim
Su Min Kim
author_facet Mohammad Faisal
Ikram Ali
Muhammad Sajjad Khan
Junsu Kim
Su Min Kim
author_sort Mohammad Faisal
collection DOAJ
description Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.
format Article
id doaj-art-8f06bd97d931401bbe1d668571e4b9f7
institution Kabale University
issn 1076-2787
1099-0526
language English
publishDate 2020-01-01
publisher Wiley
record_format Article
series Complexity
spelling doaj-art-8f06bd97d931401bbe1d668571e4b9f72025-02-03T00:58:52ZengWileyComplexity1076-27871099-05262020-01-01202010.1155/2020/66194986619498Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and ChallengesMohammad Faisal0Ikram Ali1Muhammad Sajjad Khan2Junsu Kim3Su Min Kim4Department of CS & IT, University of Malakand, Chakdara 18800, PakistanSchool of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaDepartment of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of KoreaInternet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.http://dx.doi.org/10.1155/2020/6619498
spellingShingle Mohammad Faisal
Ikram Ali
Muhammad Sajjad Khan
Junsu Kim
Su Min Kim
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Complexity
title Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
title_full Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
title_fullStr Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
title_full_unstemmed Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
title_short Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
title_sort cyber security and key management issues for internet of things techniques requirements and challenges
url http://dx.doi.org/10.1155/2020/6619498
work_keys_str_mv AT mohammadfaisal cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges
AT ikramali cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges
AT muhammadsajjadkhan cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges
AT junsukim cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges
AT suminkim cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges