A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

被引:35
|
作者
Malik, Manisha [1 ]
Dutta, Maitreyee [2 ]
Granjal, Jorge [3 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Chandigarh 600116, India
[2] Natl Inst Tech Teachers Training & Res, Comp Sci & Engn Dept, Chandigarh 600116, India
[3] Univ Coimbra, Ctr Informat & Syst, P-3030290 Coimbra, Portugal
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Authentication; Internet of Things; key bootstrapping; key management; public key cryptography; security; WIRELESS SENSOR NETWORKS; AUTHENTICATION; SECURITY; AGREEMENT; LIGHTWEIGHT; MANAGEMENT; SCHEME;
D O I
10.1109/ACCESS.2019.2900957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others. The explosive growth of Internet-connected sensing and actuating devices has bridged the gap between the physical and the digital world, with new solutions bringing benefits to people, processes, and businesses. However, security will be a major challenge in enabling most of such applications. The lack of secure links exposes data exchanged by devices to theft and attacks, with hackers already showing a keen interest in this area. Secure communication in the IoT will require a multifaceted approach, in particular, targeting aspects as relevant as the communications' protocols and data that need to be secured. One of the major aspects among these is how keys are bootstrapped in devices, for the purpose of supporting secure communications. In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things. Due to its inherent scalability, such protocols are particularly relevant for the implementation of distributed identity and trust management mechanisms on the IoT, in the context of which devices may be authenticated and trusted. The reviewed proposals are analyzed and classified on the basis of the key delivery method, the underlying cryptographic primitive, and the authentication mechanism supported. We also identify and discuss the main challenges of implementing such methods in the context of IoT applications and devices, together with the main avenues for conducting further research in the area.
引用
收藏
页码:27443 / 27464
页数:22
相关论文
共 50 条
  • [1] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [2] Authenticated Key Management Protocols for Internet of Things
    Li, Celia
    Yang, Cungang
    [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 126 - 129
  • [3] The optimization of the key exchange protocol based on public key certificates in the Internet of Things
    Zhao, Cuijie
    Wang, Guozhen
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 629 - +
  • [4] Quantum Cryptography and Quantum Key Distribution Protocols: A Survey
    Padmavathi, V.
    Vardhan, B. Vishnu
    Krishna, A. V. N.
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 556 - 562
  • [5] Public key versus symmetric key cryptography in client–server authentication protocols
    An Braeken
    [J]. International Journal of Information Security, 2022, 21 : 103 - 114
  • [6] Certificateless Public Key Cryptography: A Research Survey
    Sayid, Jacob
    Sayid, Isaac
    Kar, Jayaprakash
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 103 - 117
  • [7] A Security Framework for the Internet of Things based on Public Key Infrastructure
    Ning, Hong
    [J]. CONSTRUCTION AND URBAN PLANNING, PTS 1-4, 2013, 671-674 : 3223 - 3226
  • [8] Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
    Sani, Abubakar Sadiq
    Yuan, Dong
    Bao, Wei
    Dong, Zhao Yang
    Vucetic, Branka
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2113 - 2127
  • [9] Poster Abstract: Security Comes First, A Public-key Cryptography Framework for the Internet of Things
    Shafagh, Hossein
    Hithnawi, Anwar
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS 2014), 2014, : 135 - 136
  • [10] Public key versus symmetric key cryptography in client-server authentication protocols
    Braeken, An
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 103 - 114