2020 IEEE International Conference on Smart Internet of Things (SmartIoT) 2020
DOI: 10.1109/smartiot49966.2020.00067
|View full text |Cite
|
Sign up to set email alerts
|

An Automatic Key-update Mechanism for M2M Communication and IoT Security Enhancement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Moreover, the overhead of Per-IO-Prng is at 6.27%; notably, only 0.77% (6.27–5.50%) is added with the application of the PRNG function to more randomly change the keys and improve security. A similar experiment was provided in our previous work [ 8 ].…”
Section: Resultsmentioning
confidence: 97%
See 2 more Smart Citations
“…Moreover, the overhead of Per-IO-Prng is at 6.27%; notably, only 0.77% (6.27–5.50%) is added with the application of the PRNG function to more randomly change the keys and improve security. A similar experiment was provided in our previous work [ 8 ].…”
Section: Resultsmentioning
confidence: 97%
“…In this section, we explain the key update flow that follows the execution flow for generating a new key ( Figure 9 ). A similar execution flow was provided in our previous work [ 8 ].…”
Section: Design Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Tsai et al [13] discuss key generation to enhance security in machine to machine (M2M) communication by providing an automatic key update mechanism for IoT devices. This scheme is based on Constrained Application Protocol (CoAP), which research has identified as a suitable solution for IoT applications.…”
Section: Key Generationmentioning
confidence: 99%
“…Finally, we noticed from the abovementioned key generation techniques that they can be implemented either hardware such as being presented in articles [13,14,19] or standard common software schemes such as CoAP, CRT, DCT, MEMK, and pseudorandom number generator which are realised in articles [10,12,13,[16][17][18]. According to the system configuration, designers can choose the suitable method for key generation.…”
Section: Key Generationmentioning
confidence: 99%