(WIP) Authenticated Key Management Protocols for Internet of Things
Title | (WIP) Authenticated Key Management Protocols for Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Celia, L., Cungang, Y. |
Conference Name | 2018 IEEE International Congress on Internet of Things (ICIOT) |
ISBN Number | 978-1-5386-7244-0 |
Keywords | authenticated key management protocols, authentication, composability, cryptographic protocols, data privacy, different end systems, heterogeneous end systems, Human Behavior, interactive key management protocol, Internet of Things, Internet of Things authentication, IoT, IoT Security 2018, Key Management, Metrics, noninteractive key management protocol, Protocols, pubcrawl, Public key, Resiliency, seamless incorporation, security analysis show, security operations, Self-certified keys, Smart homes, telecommunication security |
Abstract | The Internet of Things (IoT) provides transparent and seamless incorporation of heterogeneous and different end systems. It has been widely used in many applications such as smart homes. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. Effective secure key management for things authentication is the prerequisite of security operations. In this paper, we present an interactive key management protocol and a non-interactive key management protocol to minimize the communication cost of the things. The security analysis show that the proposed schemes are resilient to various types of attacks. |
URL | https://ieeexplore.ieee.org/document/8473449 |
DOI | 10.1109/ICIOT.2018.00024 |
Citation Key | celia_wip_2018 |
- key management
- telecommunication security
- Smart homes
- Self-certified keys
- security operations
- security analysis show
- seamless incorporation
- Resiliency
- Public key
- pubcrawl
- Protocols
- noninteractive key management protocol
- Metrics
- authenticated key management protocols
- IoT Security 2018
- IoT
- Internet of Things authentication
- Internet of Things
- interactive key management protocol
- Human behavior
- heterogeneous end systems
- different end systems
- data privacy
- Cryptographic Protocols
- composability
- authentication