scispace - formally typeset
Open AccessJournal ArticleDOI

Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept

Janusz Furtak
- 03 Sep 2020 - 
- Vol. 20, Iss: 17, pp 5012
Reads0
Chats0
TLDR
The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems and is based on the use of the hardware Trusted Platform Module v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes.
Abstract
Designers and users of the Internet of Things (IoT) are devoting more and more attention to the issues of security and privacy as well as the integration of data coming from various areas. A critical element of cooperation is building mutual trust and secure data exchange. Because IoT devices usually have small memory resources, limited computing power, and limited energy resources, it is often impossible to effectively use a well-known solution based on the Certification Authority. This article describes the concept of the system for a cryptographic Key Generating and Renewing system (KGR). The concept of the solution is based on the use of the hardware Trusted Platform Module (TPM) v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes. The main tasks of the system are the secure distribution of a new symmetric key and renewal of an expired key for data exchange parties. The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems. A service based on the Message Queuing Telemetry Transport (MQTT) protocol will be used to exchange data between nodes of the KGR system.

read more

Citations
More filters
Journal ArticleDOI

Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs.

TL;DR: In this paper, the authors propose the use of non-fungible tokens (NFTs) to represent IoT devices, which are physical smart assets, and demonstrate their use on ESP32-based devices and Ethereum blockchain.
Proceedings ArticleDOI

Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments

TL;DR: In this paper , the authors investigated a secure approach to connect heterogeneous assets that rely on widely used and standardized technologies, and a set of planned experiments is presented in which systems from different nations are connected in a federated environment.
Proceedings ArticleDOI

Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments

TL;DR: In this article , the authors investigated a secure approach to connect heterogeneous assets that rely on widely used and standardized technologies, and a set of planned experiments is presented in which systems from different nations are connected in a federated environment.
Journal ArticleDOI

The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment

Janusz Furtak
- 26 May 2023 - 
TL;DR: In this article , the design and demonstrator of a system for symmetric cryptographic key generating, renewal, and distribution (KGRD) is presented, which uses the TPM 2.0 hardware module to support cryptographic procedures, including creating trust structures, key generation, and securing the node's exchange of data and resources.
References
More filters
Journal ArticleDOI

A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs.

TL;DR: A secure and efficient group key management protocol with cooperative sensor association is proposed, motivated by coded cooperative data exchange (CCDE), and formal security proofs are presented, indicating that the proposed protocol can achieve the desired security properties.
Journal ArticleDOI

An Extended Framework of Privacy-Preserving Computation With Flexible Access Control

TL;DR: Four privacy-preserving division computation schemes with flexible access control are proposed that can adapt to various application scenarios and are given security proof, efficiency and superiority through comprehensive simulations and comparisons with existing work.
Proceedings ArticleDOI

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

TL;DR: This work introduces a novel decentralized and batch-based group key management protocol to secure multicast communications that reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy.
Journal ArticleDOI

LKH++ Based Group Key Management Scheme for Wireless Sensor Network

TL;DR: Performance analysis shows WLKH is highly efficient in term of security, computation and key storage and rekeying to enhance network security and survivability against node capture.
Related Papers (5)