Secure Key Management in Embedded Systems: A First Proposal

被引:1
|
作者
Jank, Gorazd [1 ]
Schmidt, Silvia [1 ]
Koschuch, Manuel [1 ]
机构
[1] Univ Appl Sci, Competence Ctr IT Secur, FH Campus Wien, Vienna, Austria
关键词
Constrained Devices; Decision-making; Embedded Systems; Internet of Things; Secure Key Management; SCHEMES;
D O I
10.5220/0010475600810091
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of different devices. Because of this variety, many projects require unique compositions of tools, systems, and use cases. In addition, embedded devices are highly optimized and due to that are subject to different constraints. The interconnection of such products for data analysis or cooperation simultaneously increases the attack surface, which leads to requiring efficient cryptographic methods for the protection of data and communication. To enable this, a secure key management approach is needed. In practice however, there are still difficulties regarding the implementation and associated decision making of said management. All the more so since a generic one-size-fits-all approach in such a complex heterogeneous environment as the IoT simply does not exist. This paper aims to provide initial guidelines to argue the choice of a secure key management approach. To do so the state-of-the-art is presented and benefits as well as limits are evaluated. After that a set of factors and a first taxonomy are presented, which influence the final key management solution.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [41] Design of secure group key management system
    Lee, JM
    Hwang, KC
    Lee, KH
    TECHNOLOGIES, PROTOCOLS, AND SERVICES FOR NEXT-GENERATION INTERNET, 2001, 4527 : 17 - 28
  • [42] A hierarchical key management approach for secure multicast
    Wang, J
    Mihaljevic, MJ
    Harn, L
    Imai, H
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2006, PROCEEDINGS, 2006, 3894 : 422 - 434
  • [43] Versatile Key Management for Secure Cloud Storage
    Graf, Sebastian
    Lang, Patrick
    Hohenadel, Stefan A.
    Waldvogel, Marcel
    2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 469 - 474
  • [44] Efficient algorithms for secure multicast key management
    Khabiri, Elham
    Bettayeb, Said
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 787 - +
  • [45] Efficient Key Management for Secure Wireless Multicast
    Wang, Yiling
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1131 - 1136
  • [46] Dynamics of key management in secure satellite multicast
    Howarth, MP
    Iyengar, S
    Sun, ZL
    Cruickshank, H
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (02) : 308 - 319
  • [47] A survey of key management for secure group communication
    Rafaeli, S
    Hutchison, D
    ACM COMPUTING SURVEYS, 2003, 35 (03) : 309 - 329
  • [48] Secure Hierarchical Key Management for Cloud Computing
    Liu, Jin
    Sun, Jing
    Yow, Kin-Choong
    Peng, Xian-Bin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 399 - 405
  • [49] Key Management in Efficient and Secure Group Communication
    Yadav, Manisha
    Singh, Karan
    Pandey, Ajay Shekhar
    2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ELECTRONICS & SUSTAINABLE ENERGY SYSTEMS (ICETEESES), 2016, : 196 - 203
  • [50] Secure dynamic key management for sensor networks
    Riaz, Rabia
    Ali, Arshad
    Kim, Ki Hyung
    Ahmad, H. Farooq
    Suguri, Hiroki
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 29 - 33