Visible to the public (WIP) Authenticated Key Management Protocols for Internet of Things

Title(WIP) Authenticated Key Management Protocols for Internet of Things
Publication TypeConference Paper
Year of Publication2018
AuthorsCelia, L., Cungang, Y.
Conference Name2018 IEEE International Congress on Internet of Things (ICIOT)
ISBN Number978-1-5386-7244-0
Keywordsauthenticated key management protocols, authentication, composability, cryptographic protocols, data privacy, different end systems, heterogeneous end systems, Human Behavior, interactive key management protocol, Internet of Things, Internet of Things authentication, IoT, IoT Security 2018, Key Management, Metrics, noninteractive key management protocol, Protocols, pubcrawl, Public key, Resiliency, seamless incorporation, security analysis show, security operations, Self-certified keys, Smart homes, telecommunication security
Abstract

The Internet of Things (IoT) provides transparent and seamless incorporation of heterogeneous and different end systems. It has been widely used in many applications such as smart homes. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. Effective secure key management for things authentication is the prerequisite of security operations. In this paper, we present an interactive key management protocol and a non-interactive key management protocol to minimize the communication cost of the things. The security analysis show that the proposed schemes are resilient to various types of attacks.

URLhttps://ieeexplore.ieee.org/document/8473449
DOI10.1109/ICIOT.2018.00024
Citation Keycelia_wip_2018