Next Article in Journal
Development of a Solar-Powered IoT-Based Instrument for Automatic Measurement of Water Clarity
Next Article in Special Issue
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
Previous Article in Journal
Beamforming Optimization in Internet of Things Applications Using Robust Swarm Algorithm in Conjunction with Connectable and Collaborative Sensors
Previous Article in Special Issue
Efficient Algorithm for Mining Non-Redundant High-Utility Association Rules
Open AccessArticle

An Efficient Key Management Technique for the Internet of Things

1
Computer Science and Engineering Discipline, Khulna University, Khulna 9208, Bangladesh
2
Research Chair of Smart Technologies, King Saud University, Riyadh 11543, Saudi Arabia
3
College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(7), 2049; https://doi.org/10.3390/s20072049
Received: 12 February 2020 / Revised: 27 March 2020 / Accepted: 30 March 2020 / Published: 6 April 2020
(This article belongs to the Special Issue Security and Privacy Techniques in IoT Environment)
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization. View Full-Text
Keywords: internet of things; smart objects; key management; IoT security; MQTT internet of things; smart objects; key management; IoT security; MQTT
Show Figures

Figure 1

MDPI and ACS Style

Tabassum, T.; Hossain, S.A.; Rahman, M..A.; Alhamid, M.F.; Hossain, M.A. An Efficient Key Management Technique for the Internet of Things. Sensors 2020, 20, 2049.

AMA Style

Tabassum T, Hossain SA, Rahman MA, Alhamid MF, Hossain MA. An Efficient Key Management Technique for the Internet of Things. Sensors. 2020; 20(7):2049.

Chicago/Turabian Style

Tabassum, Tamanna; Hossain, SK A.; Rahman, Md. A.; Alhamid, Mohammed F.; Hossain, M. A. 2020. "An Efficient Key Management Technique for the Internet of Things" Sensors 20, no. 7: 2049.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop