Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration...
Saved in:
Main Authors: | Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2020/6619498 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
by: Mohammad Faisal, et al.
Published: (2020-01-01) -
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
by: Sufian Hameed, et al.
Published: (2019-01-01) -
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
by: Seung Wook Jung, et al.
Published: (2015-08-01) -
An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things
by: Min Wei, et al.
Published: (2018-01-01) -
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
by: Chuvakov O.
Published: (2024-06-01)