Cargando…

An Efficient Key Management Technique for the Internet of Things

The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generat...

Descripción completa

Detalles Bibliográficos
Autores principales: Tabassum, Tamanna, Hossain, SK Alamgir, Rahman, Md. Anisur, Alhamid, Mohammed F., Hossain, M. Anwar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181291/
https://www.ncbi.nlm.nih.gov/pubmed/32268487
http://dx.doi.org/10.3390/s20072049
_version_ 1783526016632750080
author Tabassum, Tamanna
Hossain, SK Alamgir
Rahman, Md. Anisur
Alhamid, Mohammed F.
Hossain, M. Anwar
author_facet Tabassum, Tamanna
Hossain, SK Alamgir
Rahman, Md. Anisur
Alhamid, Mohammed F.
Hossain, M. Anwar
author_sort Tabassum, Tamanna
collection PubMed
description The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization.
format Online
Article
Text
id pubmed-7181291
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71812912020-04-28 An Efficient Key Management Technique for the Internet of Things Tabassum, Tamanna Hossain, SK Alamgir Rahman, Md. Anisur Alhamid, Mohammed F. Hossain, M. Anwar Sensors (Basel) Article The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization. MDPI 2020-04-06 /pmc/articles/PMC7181291/ /pubmed/32268487 http://dx.doi.org/10.3390/s20072049 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tabassum, Tamanna
Hossain, SK Alamgir
Rahman, Md. Anisur
Alhamid, Mohammed F.
Hossain, M. Anwar
An Efficient Key Management Technique for the Internet of Things
title An Efficient Key Management Technique for the Internet of Things
title_full An Efficient Key Management Technique for the Internet of Things
title_fullStr An Efficient Key Management Technique for the Internet of Things
title_full_unstemmed An Efficient Key Management Technique for the Internet of Things
title_short An Efficient Key Management Technique for the Internet of Things
title_sort efficient key management technique for the internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181291/
https://www.ncbi.nlm.nih.gov/pubmed/32268487
http://dx.doi.org/10.3390/s20072049
work_keys_str_mv AT tabassumtamanna anefficientkeymanagementtechniquefortheinternetofthings
AT hossainskalamgir anefficientkeymanagementtechniquefortheinternetofthings
AT rahmanmdanisur anefficientkeymanagementtechniquefortheinternetofthings
AT alhamidmohammedf anefficientkeymanagementtechniquefortheinternetofthings
AT hossainmanwar anefficientkeymanagementtechniquefortheinternetofthings
AT tabassumtamanna efficientkeymanagementtechniquefortheinternetofthings
AT hossainskalamgir efficientkeymanagementtechniquefortheinternetofthings
AT rahmanmdanisur efficientkeymanagementtechniquefortheinternetofthings
AT alhamidmohammedf efficientkeymanagementtechniquefortheinternetofthings
AT hossainmanwar efficientkeymanagementtechniquefortheinternetofthings