Secure key-distribution in IoT cloud networks

SR Moharana, VK Jha, A Satpathy… - … on Sensing, Signal …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) cloud networks is itself a pervasive idea where all the physical
objects are connected over the internet and are allocated with special self-identifying ability …

Secure key distribution for IoT networks based on physical layer security

T Alshamaseen, S Althunibat… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology has spread across many fields. IoT networks contain a
large number of devices that work together and exchange a large amount of information …

Probability based keys sharing for IoT security

G Leshem, E David, M Domb - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is composed of a vast number of connected devices, interacting
among them in real-time and high messaging volume. Such setting is in high probability to …

End-to-end security architecture for federated cloud and IoT networks

P Massonet, L Deru, A Achour, S Dupont… - … on Smart Computing …, 2017 - ieeexplore.ieee.org
Smart Internet of Things (IoT) applications will rely on advanced IoT platforms that not only
provide access to IoT sensors and actuators, but also provide access to cloud services and …

Lightweight collaborative key establishment scheme for the Internet of Things

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computer Networks, 2014 - Elsevier
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous
nature of IoT communications and imbalance in resource capabilities between IoT entities …

A secure hybrid cloud enabled architecture for internet of things

A Sharma, T Goyal, ES Pilli… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
Rapid advances in digitalization, Internet and world wide web enable the communication
between two computing hosts across any location in the globe. Pervasive or ubiquitous …

A scalable key pre-distribution scheme based on the unital design for the internet of things security

V Chegeni, H Haj Seyyed Javadi… - IETE Journal of …, 2023 - Taylor & Francis
In recent years, the Internet of Things (IoT) has swept through most aspects of people lives,
where all objects are connected to a common network. Therefore, the security of IoT devices …

On the performance of key pre-distribution for RPL-based IoT networks

A El Hajjar, G Roussos, M Paterson - … , Safety and Security in IoT: Second …, 2017 - Springer
A core ingredient of the Internet of Things (IoT) is the use of deeply embedded resource
constrained devices, often connected to the Internet over Low Power and Lossy Networks …

A Secured Protocol for IoT Networks

AV Bhaskar, A Baingane, R Jahnige, Q Zhang… - arXiv preprint arXiv …, 2020 - arxiv.org
Researchers in the past have shown that Symmetric key cryptography is generally
considered infeasible and public key cryptography, at times, fails to provide sufficient …

Security analysis of existing IoT key management protocols

S Naoui, ME Elhdhili, LA Saidane - 2016 IEEE/ACS 13th …, 2016 - ieeexplore.ieee.org
The Internet of things (IoT) interconnects every object of our living space to the Internet. Its
adoption relies on the settling down of robust security solutions, especially key management …