Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)

被引:0
|
作者
Jamshiya, P. K. [1 ]
Menon, Divya M. [1 ]
机构
[1] Jyothi Engn Coll, Dept Comp Sci, Trichur, India
关键词
IoT; key generation; security; trusted-third-party;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IoT incorporates a system of physical objects that are interconnected to exchange and collect data over the internet. The services provided by IoT, though improves the standard of our lives, have major challenges on securing networks and data in transmission because of the innumerable devices and services that are associated with it. Securing data is essential and it must not be seen as an afterthought. This paper proposes a secure Trusted-third-party based key exchange protocol (STKEP) for data communication in Internet of Things (IOT). This work employs an elliptic curve cryptographic method for encryption process. A session key is used to encrypt the data which is transmitted between the communication parties with the help of a trusted third party.
引用
收藏
页码:1834 / 1838
页数:5
相关论文
共 50 条
  • [1] Secure key exchange protocol using graph and trusted third party
    Deshmukh, Maroti
    Rawat, Arjun Singh
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04)
  • [2] Secure and Trusted Telemedicine in Internet of Things IoT
    Albalawi, Umar
    Joshi, Shital
    [J]. 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 30 - 34
  • [3] Design of a Secure Sum Protocol using Trusted Third Party System for Secure Multi-Party Computations
    Jahan, Israt
    Sharmy, Nure Naushin
    Jahan, Sadia
    Ebha, Farjana Akther
    Lisa, Nusrat Jahan
    [J]. 2015 6th International Conference on Information and Communication Systems (ICICS), 2015, : 136 - 141
  • [4] Multi level Key Exchange and Encryption Protocol for Internet of Things(IoT)
    Poomagal, C. T.
    Kumar, Sathish G. A.
    Mehta, Deval
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2020, 35 (01): : 51 - 63
  • [5] Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party
    Kemmoe, Victor Youdom
    Kwon, Yongseok
    Hussain, Rasheed
    Cho, Sunghyun
    Son, Junggab
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3176 - 3193
  • [6] A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things
    Yan, Tao
    Wen, Qiaoyan
    [J]. KNOWLEDGE DISCOVERY AND DATA MINING, 2012, 135 : 201 - 208
  • [7] TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things
    Khelf, Roumaissa
    Ghoualmi-Zine, Nacira
    Ahmim, Marwa
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2020, 11 (03): : 1 - 21
  • [8] A secure data exchange protocol for the internet of things
    Zhang, Yaping
    Bo, Lina
    Ma, Qian
    [J]. Communications in Computer and Information Science, 2013, 332 : 224 - 231
  • [9] A Secure Data Exchange Protocol for the Internet of Things
    Zhang, Yaping
    Bo, Lina
    Ma, Qian
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 224 - +
  • [10] Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things
    Trivedi, Hiral S.
    Patel, Sankita J.
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 812 - 818