scispace - formally typeset
Open AccessJournal ArticleDOI

Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept

Janusz Furtak
- 03 Sep 2020 - 
- Vol. 20, Iss: 17, pp 5012
Reads0
Chats0
TLDR
The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems and is based on the use of the hardware Trusted Platform Module v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes.
Abstract
Designers and users of the Internet of Things (IoT) are devoting more and more attention to the issues of security and privacy as well as the integration of data coming from various areas. A critical element of cooperation is building mutual trust and secure data exchange. Because IoT devices usually have small memory resources, limited computing power, and limited energy resources, it is often impossible to effectively use a well-known solution based on the Certification Authority. This article describes the concept of the system for a cryptographic Key Generating and Renewing system (KGR). The concept of the solution is based on the use of the hardware Trusted Platform Module (TPM) v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes. The main tasks of the system are the secure distribution of a new symmetric key and renewal of an expired key for data exchange parties. The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems. A service based on the Message Queuing Telemetry Transport (MQTT) protocol will be used to exchange data between nodes of the KGR system.

read more

Citations
More filters
Journal ArticleDOI

Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs.

TL;DR: In this paper, the authors propose the use of non-fungible tokens (NFTs) to represent IoT devices, which are physical smart assets, and demonstrate their use on ESP32-based devices and Ethereum blockchain.
Proceedings ArticleDOI

Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments

TL;DR: In this paper , the authors investigated a secure approach to connect heterogeneous assets that rely on widely used and standardized technologies, and a set of planned experiments is presented in which systems from different nations are connected in a federated environment.
Proceedings ArticleDOI

Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments

TL;DR: In this article , the authors investigated a secure approach to connect heterogeneous assets that rely on widely used and standardized technologies, and a set of planned experiments is presented in which systems from different nations are connected in a federated environment.
Journal ArticleDOI

The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment

Janusz Furtak
- 26 May 2023 - 
TL;DR: In this article , the design and demonstrator of a system for symmetric cryptographic key generating, renewal, and distribution (KGRD) is presented, which uses the TPM 2.0 hardware module to support cryptographic procedures, including creating trust structures, key generation, and securing the node's exchange of data and resources.
References
More filters
Journal ArticleDOI

Procedures for sensor nodes operation in the secured domain

TL;DR: This paper presents the concept of a safe domain of sensor nodes for IoT and describes the data structures necessary to ensure security in the domain and the way of protecting the resources of each node.
Journal ArticleDOI

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.

TL;DR: This work proposes a secure and efficient data sharing and searching scheme to address the aforementioned problem such that the scheme is secure against both off-line KGA and on-lines KGA performed by external and internal adversaries.
Book ChapterDOI

Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups

TL;DR: This work proposes to enhance the previously proposed protocol (i.e. DBGK) with polynomial computations, which achieves a better scalability and fault tolerance compared to DBK and allows additional controllers to be included with no impact on storage cost regarding constrained members.
Related Papers (5)