Cargando…
An Efficient Key Management Technique for the Internet of Things
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generat...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181291/ https://www.ncbi.nlm.nih.gov/pubmed/32268487 http://dx.doi.org/10.3390/s20072049 |
_version_ | 1783526016632750080 |
---|---|
author | Tabassum, Tamanna Hossain, SK Alamgir Rahman, Md. Anisur Alhamid, Mohammed F. Hossain, M. Anwar |
author_facet | Tabassum, Tamanna Hossain, SK Alamgir Rahman, Md. Anisur Alhamid, Mohammed F. Hossain, M. Anwar |
author_sort | Tabassum, Tamanna |
collection | PubMed |
description | The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization. |
format | Online Article Text |
id | pubmed-7181291 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71812912020-04-28 An Efficient Key Management Technique for the Internet of Things Tabassum, Tamanna Hossain, SK Alamgir Rahman, Md. Anisur Alhamid, Mohammed F. Hossain, M. Anwar Sensors (Basel) Article The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization. MDPI 2020-04-06 /pmc/articles/PMC7181291/ /pubmed/32268487 http://dx.doi.org/10.3390/s20072049 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tabassum, Tamanna Hossain, SK Alamgir Rahman, Md. Anisur Alhamid, Mohammed F. Hossain, M. Anwar An Efficient Key Management Technique for the Internet of Things |
title | An Efficient Key Management Technique for the Internet of Things |
title_full | An Efficient Key Management Technique for the Internet of Things |
title_fullStr | An Efficient Key Management Technique for the Internet of Things |
title_full_unstemmed | An Efficient Key Management Technique for the Internet of Things |
title_short | An Efficient Key Management Technique for the Internet of Things |
title_sort | efficient key management technique for the internet of things |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181291/ https://www.ncbi.nlm.nih.gov/pubmed/32268487 http://dx.doi.org/10.3390/s20072049 |
work_keys_str_mv | AT tabassumtamanna anefficientkeymanagementtechniquefortheinternetofthings AT hossainskalamgir anefficientkeymanagementtechniquefortheinternetofthings AT rahmanmdanisur anefficientkeymanagementtechniquefortheinternetofthings AT alhamidmohammedf anefficientkeymanagementtechniquefortheinternetofthings AT hossainmanwar anefficientkeymanagementtechniquefortheinternetofthings AT tabassumtamanna efficientkeymanagementtechniquefortheinternetofthings AT hossainskalamgir efficientkeymanagementtechniquefortheinternetofthings AT rahmanmdanisur efficientkeymanagementtechniquefortheinternetofthings AT alhamidmohammedf efficientkeymanagementtechniquefortheinternetofthings AT hossainmanwar efficientkeymanagementtechniquefortheinternetofthings |