Visible to the public Two-Phase Incentive-Based Secure Key System for Data Management in Internet of Things

TitleTwo-Phase Incentive-Based Secure Key System for Data Management in Internet of Things
Publication TypeConference Paper
Year of Publication2017
AuthorsKrishna, M. B., Rodrigues, J. J. P. C.
Conference Name2017 IEEE International Conference on Communications (ICC)
Date Publishedmay
ISBN Number978-1-4673-8999-0
KeywordsAggregation, authentication, authorisation, authorized transactions, Certificate Generation, Complexity theory, computer network security, data aggregator nodes, data collector nodes, data expert nodes, data integrity, data manager nodes, data privacy, data transactions, Database management in IoT, distributed data management, Distributed databases, distributed secure data management system, DSM-C module verifies, expert systems, GSM-C module, high-level secure keys, human factors, Internet of Things, key complexity, key cost, light-weight keys, low-level secure keys, multiphase security, network optimization, privacy, Privacy Policies, pubcrawl, Scalability, security keys, self-trust incentive level, server-trust incentive level, Servers, service providers, TISK phase-I Generic Service Manager, TISK phase-II Dedicated Service Manager, TISK system, two-phase incentive-based secure key system, user nodes
Abstract

Internet of Things (IoT) distributed secure data management system is characterized by authentication, privacy policies to preserve data integrity. Multi-phase security and privacy policies ensure confidentiality and trust between the users and service providers. In this regard, we present a novel Two-phase Incentive-based Secure Key (TISK) system for distributed data management in IoT. The proposed system classifies the IoT user nodes and assigns low-level, high-level security keys for data transactions. Low-level secure keys are generic light-weight keys used by the data collector nodes and data aggregator nodes for trusted transactions. TISK phase-I Generic Service Manager (GSM-C) module verifies the IoT devices based on self-trust incentive and server-trust incentive levels. High-level secure keys are dedicated special purpose keys utilized by data manager nodes and data expert nodes for authorized transactions. TISK phase-II Dedicated Service Manager (DSM-C) module verifies the certificates issued by GSM-C module. DSM-C module further issues high-level secure keys to data manager nodes and data expert nodes for specific purpose transactions. Simulation results indicate that the proposed TISK system reduces the key complexity and key cost to ensure distributed secure data management in IoT network.

URLhttps://ieeexplore.ieee.org/document/7996368
DOI10.1109/ICC.2017.7996368
Citation Keykrishna_two-phase_2017