scispace - formally typeset
Open AccessJournal ArticleDOI

The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment

Janusz Furtak
- 26 May 2023 - 
- Vol. 23, Iss: 11, pp 5102-5102
Reads0
Chats0
TLDR
In this article , the design and demonstrator of a system for symmetric cryptographic key generating, renewal, and distribution (KGRD) is presented, which uses the TPM 2.0 hardware module to support cryptographic procedures, including creating trust structures, key generation, and securing the node's exchange of data and resources.
Abstract
The Internet of Things (IoT) is a very abundant source of data, as well as a source of many vulnerabilities. A significant challenge is preparing security solutions to protect IoT nodes’ resources and the data exchanged. The difficulty usually stems from the insufficient resources of these nodes in terms of computing power, memory size, range energy resource, and wireless link performance. The paper presents the design and demonstrator of a system for symmetric cryptographic Key Generating, Renewing, and Distributing (KGRD). The system uses the TPM 2.0 hardware module to support cryptographic procedures, including creating trust structures, key generation, and securing the node’s exchange of data and resources. Clusters of sensor nodes and traditional systems can use the KGRD system to secure data exchange in the federated cooperation of systems with IoT-derived data sources. The transmission medium for exchanging data between KGRD system nodes is the Message Queuing Telemetry Transport (MQTT) service, which is commonly used in IoT networks.

read more

References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

DDoS in the IoT: Mirai and Other Botnets

TL;DR: The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service attacks.
Journal ArticleDOI

Evaluating Critical Security Issues of the IoT World: Present and Future Challenges

TL;DR: This paper tries to bring order on the IoT security panorama providing a taxonomic analysis from the perspective of the three main key layers of the IoT system model: 1) perception; 2) transportation; and 3) application levels.
Journal ArticleDOI

Securing the Internet of Things: A Standardization Perspective

TL;DR: An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices.
Journal ArticleDOI

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

TL;DR: A state-of-art of lightweight cryptographic primitives which include lightweight block cipher, hash function, stream ciphers, high performance system, and low resources device for IoT environment are discussed in details.