...
首页> 外文期刊>IETE Technical Review >Efficient Key Generation Techniques for Securing IoT Communication Protocols
【24h】

Efficient Key Generation Techniques for Securing IoT Communication Protocols

机译:用于保护IOT通信协议的有效关键生成技术

获取原文
获取原文并翻译 | 示例

摘要

Internet of things (IoT) is getting bigger as communication infrastructure and device capabilities are getting improved day-by-day, creating a huge market for IoT devices for commercial as well as personal usage. This paper sheds light on the compromises done by vendors on the grounds of security, resources and flexibility to lure customers with low prices, smaller and fancier designs of IoT device and its consequences. Most of the IoT devices are resource-constrained and hence standardization bodies such as IEEE and IETF gave many protocols for IoT devices which are defined over IoT protocol stack. The degree of security in each layer of IoT protocol stack is discussed and it is found that NFC protocol which operates on physical-data link layer and 6LoWPAN, a network layer protocol, lack proper key management while encrypting the data. A most important part of key management in cryptographic algorithms is key generation and storage (if needed). Different types and methods of key generation techniques are also discussed which might give a solution over a variety of situations combining the level of security requirement and resources available in strengthening the abovementioned communication protocols.
机译:事物互联网(IOT)随着通信基础设施和设备功能逐年改善,为商业和个人用途为IOT设备创造了一个巨大的市场。本文阐明了供应商以安全,资源和灵活性为诱导客户的低价,小型和猛禽设计的妥协,以诱导IOT设备的较小和后果的影响。大多数物联网设备是资源约束的,因此,诸如IEEE和IETF的标准化机构对IEE设备的许多协议提供了由IoT协议栈定义的。讨论了每层IOT协议栈中的安全程度,并且发现在物理数据链路层和6LOWPAN上运行的NFC协议,网络层协议在加密数据时缺乏适当的密钥管理。加密算法中的主要管理中最重要的部分是关键生成和存储(如果需要)。还讨论了不同类型和方法的关键生成技术,其可以在加强上述通信协议中的安全要求和资源的水平中提供多种情况的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号