Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept
Reads0
Chats0
TLDR
The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems and is based on the use of the hardware Trusted Platform Module v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes.Abstract:
Designers and users of the Internet of Things (IoT) are devoting more and more attention to the issues of security and privacy as well as the integration of data coming from various areas. A critical element of cooperation is building mutual trust and secure data exchange. Because IoT devices usually have small memory resources, limited computing power, and limited energy resources, it is often impossible to effectively use a well-known solution based on the Certification Authority. This article describes the concept of the system for a cryptographic Key Generating and Renewing system (KGR). The concept of the solution is based on the use of the hardware Trusted Platform Module (TPM) v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes. The main tasks of the system are the secure distribution of a new symmetric key and renewal of an expired key for data exchange parties. The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems. A service based on the Message Queuing Telemetry Transport (MQTT) protocol will be used to exchange data between nodes of the KGR system.read more
Citations
More filters
Journal ArticleDOI
Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs.
TL;DR: In this paper, the authors propose the use of non-fungible tokens (NFTs) to represent IoT devices, which are physical smart assets, and demonstrate their use on ESP32-based devices and Ethereum blockchain.
Proceedings ArticleDOI
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
TL;DR: In this paper , the authors investigated a secure approach to connect heterogeneous assets that rely on widely used and standardized technologies, and a set of planned experiments is presented in which systems from different nations are connected in a federated environment.
Proceedings ArticleDOI
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
TL;DR: In this article , the authors investigated a secure approach to connect heterogeneous assets that rely on widely used and standardized technologies, and a set of planned experiments is presented in which systems from different nations are connected in a federated environment.
Journal ArticleDOI
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
TL;DR: In this article , the design and demonstrator of a system for symmetric cryptographic key generating, renewal, and distribution (KGRD) is presented, which uses the TPM 2.0 hardware module to support cryptographic procedures, including creating trust structures, key generation, and securing the node's exchange of data and resources.
References
More filters
Journal ArticleDOI
Procedures for sensor nodes operation in the secured domain
TL;DR: This paper presents the concept of a safe domain of sensor nodes for IoT and describes the data structures necessary to ensure security in the domain and the way of protecting the resources of each node.
Journal ArticleDOI
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
TL;DR: This work proposes a secure and efficient data sharing and searching scheme to address the aforementioned problem such that the scheme is secure against both off-line KGA and on-lines KGA performed by external and internal adversaries.
Book ChapterDOI
Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups
TL;DR: This work proposes to enhance the previously proposed protocol (i.e. DBGK) with polynomial computations, which achieves a better scalability and fault tolerance compared to DBK and allows additional controllers to be included with no impact on storage cost regarding constrained members.