Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2020/6619498 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832568511516377088 |
---|---|
author | Mohammad Faisal Ikram Ali Muhammad Sajjad Khan Junsu Kim Su Min Kim |
author_facet | Mohammad Faisal Ikram Ali Muhammad Sajjad Khan Junsu Kim Su Min Kim |
author_sort | Mohammad Faisal |
collection | DOAJ |
description | Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques. |
format | Article |
id | doaj-art-8f06bd97d931401bbe1d668571e4b9f7 |
institution | Kabale University |
issn | 1076-2787 1099-0526 |
language | English |
publishDate | 2020-01-01 |
publisher | Wiley |
record_format | Article |
series | Complexity |
spelling | doaj-art-8f06bd97d931401bbe1d668571e4b9f72025-02-03T00:58:52ZengWileyComplexity1076-27871099-05262020-01-01202010.1155/2020/66194986619498Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and ChallengesMohammad Faisal0Ikram Ali1Muhammad Sajjad Khan2Junsu Kim3Su Min Kim4Department of CS & IT, University of Malakand, Chakdara 18800, PakistanSchool of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaDepartment of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of KoreaDepartment of Electronic Engineering, Korea Polytechnic University, Siheung, Republic of KoreaInternet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.http://dx.doi.org/10.1155/2020/6619498 |
spellingShingle | Mohammad Faisal Ikram Ali Muhammad Sajjad Khan Junsu Kim Su Min Kim Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges Complexity |
title | Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges |
title_full | Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges |
title_fullStr | Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges |
title_full_unstemmed | Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges |
title_short | Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges |
title_sort | cyber security and key management issues for internet of things techniques requirements and challenges |
url | http://dx.doi.org/10.1155/2020/6619498 |
work_keys_str_mv | AT mohammadfaisal cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges AT ikramali cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges AT muhammadsajjadkhan cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges AT junsukim cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges AT suminkim cybersecurityandkeymanagementissuesforinternetofthingstechniquesrequirementsandchallenges |