2019
DOI: 10.18494/sam.2019.2085
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things

Abstract: In this paper, we propose a new mechanism to improve the disadvantage of the security mechanism proposed by a scholar and then fulfill the demands of Internet of Things (IoT) to go through the decentralized environment access control functions. We also propose the date-constrained hierarchical key management scheme for mobile agents. With elliptic curve cryptosystems (ECCs) and discrete logarithms, the proposed scheme is flexible. Moreover, the duration of access for each security class is restricted with a ce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Recently, researchers in [10,[19][20][21] proposed a stable shared encryption protocol focused on ECDH and ECC for secure communication of embedded devices. This scheme provides mutual authentication and essential requirements for security.…”
Section: Ecc/ecdh Based Key Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, researchers in [10,[19][20][21] proposed a stable shared encryption protocol focused on ECDH and ECC for secure communication of embedded devices. This scheme provides mutual authentication and essential requirements for security.…”
Section: Ecc/ecdh Based Key Managementmentioning
confidence: 99%
“…There are notable works in order to provide authentication and protection of IoT data transfer with a focus on key management. Examples include mutual key management technique (KMP) [8], group key management technique (GKMP) [9], Elliptic Curve Cryptography (ECC)/Elliptic Curve Diffie Hellman (ECDH) based key management [10] etc. Some of these techniques utilize asymmetric cryptosystems while others utilize symmetric key cryptosystems.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, it does not consider the dynamic changes of the nodes. In 2019, a decentralized key management scheme for the Internet of things is proposed in Hsiao and Chen 26 . However, it needs PKI and takes several rounds of interaction.…”
Section: Introductionmentioning
confidence: 99%