A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
Key generation for internet of things: A contemporary survey
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …
of Things devices that have no prior knowledge between each other. In the past few years, a …
Lightweight collaborative key establishment scheme for the Internet of Things
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous
nature of IoT communications and imbalance in resource capabilities between IoT entities …
nature of IoT communications and imbalance in resource capabilities between IoT entities …
Lightweight coap-based bootstrapping service for the internet of things
D Garcia-Carrillo, R Marin-Lopez - Sensors, 2016 - mdpi.com
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial
applications and personal applications, such as medical e-health, smart cities, etc. The …
applications and personal applications, such as medical e-health, smart cities, etc. The …
Proxy-based end-to-end key establishment protocol for the Internet of Things
The Internet of Things (IoT) drives the world towards an always connected paradigm by
interconnecting wide ranges of network devices irrespective of their resource capabilities …
interconnecting wide ranges of network devices irrespective of their resource capabilities …
Multihop bootstrapping with EAP through CoAP intermediaries for IoT
D Garcia-Carrillo, R Marin-Lopez - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
In the renowned Internet of Things (IoT) networks, it is expected a vast number of devices
with IP connectivity and constrained capabilities. Due to reduced resources they are the …
with IP connectivity and constrained capabilities. Due to reduced resources they are the …
Lightweight and escrow-less authenticated key agreement for the internet of things
Security is essential for wide wireless sensor network (WSN) deployments, such as the
Internet of Things (IoT). However, the resource-constrained nature of sensors severely …
Internet of Things (IoT). However, the resource-constrained nature of sensors severely …
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices
MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …
Application layer key establishment for end-to-end security in IoT
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
Key distribution protocol for industrial Internet of Things without implicit certificates
MH Eldefrawy, N Pereira… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is
supporting the introduction of very desirable improvements, such as increasing production …
supporting the introduction of very desirable improvements, such as increasing production …