An Efficient Key Management Technique for the Internet of Things
1
Computer Science and Engineering Discipline, Khulna University, Khulna 9208, Bangladesh
2
Research Chair of Smart Technologies, King Saud University, Riyadh 11543, Saudi Arabia
3
College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(7), 2049; https://doi.org/10.3390/s20072049
Received: 12 February 2020 / Revised: 27 March 2020 / Accepted: 30 March 2020 / Published: 6 April 2020
(This article belongs to the Special Issue Security and Privacy Techniques in IoT Environment)
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization.
View Full-Text
Keywords:
internet of things; smart objects; key management; IoT security; MQTT
▼
Show Figures
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
MDPI and ACS Style
Tabassum, T.; Hossain, S.A.; Rahman, M..A.; Alhamid, M.F.; Hossain, M.A. An Efficient Key Management Technique for the Internet of Things. Sensors 2020, 20, 2049.
AMA Style
Tabassum T, Hossain SA, Rahman MA, Alhamid MF, Hossain MA. An Efficient Key Management Technique for the Internet of Things. Sensors. 2020; 20(7):2049.
Chicago/Turabian StyleTabassum, Tamanna; Hossain, SK A.; Rahman, Md. A.; Alhamid, Mohammed F.; Hossain, M. A. 2020. "An Efficient Key Management Technique for the Internet of Things" Sensors 20, no. 7: 2049.
Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.
Search more from Scilit