An elliptic curve Key Management Scheme for Internet of Things
نویسنده
چکیده
The Internet of Things (IOT) is the network of physical entities, such as wireless sensors, and radio frequency identification (RFID). Due to the rapid progress of the hardware and software in the last decade, Internet of Things is an emerging area of research. However, protecting the privacy in IoT networks is very challenging due to the heterogeneous nature of the IoT entities. Due to the low storage, energy, and computing resources of things involved in the IOT, specialized security prototcols for IoT networks are needed. To provide the IoT with the necessary security services, efficient key management schemes must be implemented. In this paper, a threshold key management scheme for IoT using elliptic curve discrete logarithm based cryptosystem is presented. The proposed key management scheme constructs a secure session key among the IoT entities. The proposed key management scheme is evaluated through extensive timing simulations and complexity evaluation.
منابع مشابه
A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملAn efficient blind signature scheme based on the elliptic curve discrete logarithm problem
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملNovel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY
Multimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications. As MIKEY becomes widely deployed, it becomes worthwhile to not confine its applications to real-time or other specific applications, but also to extend the standard to other scenarios as well. For instance, MIKEY can be used to...
متن کامل