Key Management Schemes in Internet of Things: A Matrix Approach
- 28 Downloads
Internet of things (IoT) as a rising technology have a great potential to be used in essential scenarios such as battlefields and industrial applications like construction, traffic monitoring, environment watching and smart homes and many other situations. One of the major challenge IoT security face today is vulnerability to various attacks. It is important to consider the inherent security challenges, like securing the communication channel between two sensor nodes to increase its performance. In order to achieve it, it is necessary to apply key management mechanisms between the nodes to shield or protect the information flow. The purpose of this chapter is to introduce different matrix based key management schemes in IoT and give a deep understanding of some security mechanisms which are used to secure the communication channel. Key establishment could be a difficult problem due to the resource constrained sensor nodes. Despite the fact, several effective solutions are proposed but none of them is practical and appropriately suitable for extremely large amount of sensor nodes. This chapter presents significant matrix based key management systems that are implemented in real world for IoT security. This chapter present some of the techniques like BLOM’s, CARPY, KRONECKER PRODUCT and some other pairwise key management schemes. A comparison of different matrix based key management schemes is presented along with their merits and demerits.
- 1.Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)
- 2.Yu, C.-M., Lu, C.-S., Kuo, S.-Y.: A simple non-interactive pairwise key establishment scheme in sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE (2009)Google Scholar
- 3.Tsai, I.-C., Yu, C.-M., Yokota, H., Kuo, S.-Y.: Key management in Internet of Things via Kronecker product. In: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 118–124. IEEE (2017)Google Scholar
- 10.Blom, R.: An optimal class of symmetric key generation systems. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 335–338. Springer (1984)Google Scholar
- 13.Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.): Futuristic Trends in Network and Communication Technologies. FTNCT (2018)Google Scholar