IDEAS home Printed from https://ideas.repec.org/a/hin/complx/6619498.html
   My bibliography  Save this article

Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

Author

Listed:
  • Mohammad Faisal
  • Ikram Ali
  • Muhammad Sajjad Khan
  • Junsu Kim
  • Su Min Kim

Abstract

Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. Furthermore, in this research work, we develop a novel permutation of threshold and identity-based key management schemes for the Internet of Things environment and have proposed future directions to counteract the attacks on confidentiality, integrity, authentication, and availability of security services in the Internet of Things environment and identified the two key management schemes, that is, identity and threshold schemes for Internet of Things, to resolve Internet of Things key management issues and maximum possible security services effective implementation. We evaluate our scheme with the help of mathematical and statistical techniques.

Suggested Citation

  • Mohammad Faisal & Ikram Ali & Muhammad Sajjad Khan & Junsu Kim & Su Min Kim, 2020. "Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges," Complexity, Hindawi, vol. 2020, pages 1-9, December.
  • Handle: RePEc:hin:complx:6619498
    DOI: 10.1155/2020/6619498
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/8503/2020/6619498.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/8503/2020/6619498.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2020/6619498?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:complx:6619498. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.