Light-Weight Secure IoT Key Generator and Management
نویسندگان
چکیده
منابع مشابه
Applicable Light-weight Cryptography to Secure Medical Data in Iot Systems
Different applications require different level of security where the scarce of resource plays effective role. In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption algorithm is a must. Electronic sensors are used to collect medical data from the patient's body acquiring its transmission to the healthcare system securely. It is ...
متن کاملLight-weight Key Management Scheme for Active RFID Applications
Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all R...
متن کاملSDDR: Light-Weight, Secure Mobile Encounters
Emerging mobile social apps use short-range radios to discover nearby devices and users. The device discovery protocol used by these apps must be highly energy-efficient since it runs frequently in the background. Also, a good protocol must enable secure communication (both during and after a period of device co-location), preserve user privacy (users must not be tracked by unauthorized third p...
متن کاملKISS: "Key It Simple and Secure" Corporate Key Management
Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management archi...
متن کاملSecure and efficient group key management with shared key derivation
In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Robotics & Automation Engineering Journal
سال: 2018
ISSN: 2577-2899
DOI: 10.19080/raej.2018.03.555625