Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)

被引:0
|
作者
Jamshiya, P. K. [1 ]
Menon, Divya M. [1 ]
机构
[1] Jyothi Engn Coll, Dept Comp Sci, Trichur, India
关键词
IoT; key generation; security; trusted-third-party;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IoT incorporates a system of physical objects that are interconnected to exchange and collect data over the internet. The services provided by IoT, though improves the standard of our lives, have major challenges on securing networks and data in transmission because of the innumerable devices and services that are associated with it. Securing data is essential and it must not be seen as an afterthought. This paper proposes a secure Trusted-third-party based key exchange protocol (STKEP) for data communication in Internet of Things (IOT). This work employs an elliptic curve cryptographic method for encryption process. A session key is used to encrypt the data which is transmitted between the communication parties with the help of a trusted third party.
引用
收藏
页码:1834 / 1838
页数:5
相关论文
共 50 条
  • [41] Internet of Things (IoT): Smart and Secure Service Delivery
    Bertino, Elisa
    Choo, Kim-Kwang Raymond
    Georgakopolous, Dimitrios
    Nepal, Surya
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
  • [42] Data Anonymous Collection Protocol without Trusted Third Party
    Zhou Zhiping
    Li Zhicong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1442 - 1449
  • [43] AN OWNERSHIP SHARING PROTOCOL FOR RFID WITHOUT A TRUSTED THIRD PARTY
    Kapoor, Gaurav
    Piramuthu, Selwyn
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 28 - 30
  • [44] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [45] A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAP
    Vithanage, Nethmi N. Nanayakkara
    Thanthrige, Sangeeth S. Hetti
    Kapuge, Malsha C. K. Paththini
    Malwenna, Tharindu H.
    Liyanapathirana, Chethana
    Wijekoon, Janaka L.
    [J]. 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 837 - 841
  • [46] Secure data exchange in Industrial Internet of Things
    Sukiasyan, Anna
    Badikyan, Hasmik
    Pedrosa, Tiago
    Leitao, Paulo
    [J]. NEUROCOMPUTING, 2022, 484 : 183 - 195
  • [47] Internet of Things (IoT): Architecture and Design
    Abed, Ali Ahmed
    [J]. 2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [48] The design of a trusted third party for electronic commerce transactions
    Ba, SL
    Whinston, AB
    Zhang, H
    [J]. ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 269 - 271
  • [49] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
    Wu Qingtao
    zhang Hongyi
    Pu Jiexin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
  • [50] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    [J]. COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8