A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things

M Malik, M Dutta, J Granjal - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …

Key generation for internet of things: A contemporary survey

W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …

Lightweight collaborative key establishment scheme for the Internet of Things

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computer Networks, 2014 - Elsevier
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous
nature of IoT communications and imbalance in resource capabilities between IoT entities …

Lightweight coap-based bootstrapping service for the internet of things

D Garcia-Carrillo, R Marin-Lopez - Sensors, 2016 - mdpi.com
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial
applications and personal applications, such as medical e-health, smart cities, etc. The …

Proxy-based end-to-end key establishment protocol for the Internet of Things

P Porambage, A Braeken, P Kumar… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) drives the world towards an always connected paradigm by
interconnecting wide ranges of network devices irrespective of their resource capabilities …

Multihop bootstrapping with EAP through CoAP intermediaries for IoT

D Garcia-Carrillo, R Marin-Lopez - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
In the renowned Internet of Things (IoT) networks, it is expected a vast number of devices
with IP connectivity and constrained capabilities. Due to reduced resources they are the …

Lightweight and escrow-less authenticated key agreement for the internet of things

MA Simplicio Jr, MVM Silva, RCA Alves… - Computer …, 2017 - Elsevier
Security is essential for wide wireless sensor network (WSN) deployments, such as the
Internet of Things (IoT). However, the resource-constrained nature of sensors severely …

A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices

MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …

Application layer key establishment for end-to-end security in IoT

S Pérez, JL Hernández-Ramos, S Raza… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …

Key distribution protocol for industrial Internet of Things without implicit certificates

MH Eldefrawy, N Pereira… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is
supporting the introduction of very desirable improvements, such as increasing production …