Study and analysis of key generation techniques in internet of things

Abstract Wireless communication-based services compromised with security threats due to the open channel communication model. Free communication channel models have limited bandwidth and open port communication. Due to the limited bandwidth implementation of security channel is a very complex process in the internet of things (IoT). The trend of technology is interdisciplinary of the IoT puts the demands of secured communication. The key generation mechanism provides the end to end security communication process for the internet of things (IoT). In the process of approval and authentication used lightweight key generation methods for protection. The key generation mechanism used symmetric, asymmetric and hybrid cryptography. The process of a key generation faced a problem of high energy and time complexity. In this paper presents the study and analysis of key generation algorithms used in the internet of things (IoT). For the generation of key, four algorithms are used such as AES, 3DES, RSA and ECC. These algorithms used different key size and different file size and measured the computational cost. The measured computational cost gives the direction of key generation for wireless based device communication.

[1]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[2]  NavimipourNima Jafari,et al.  Data aggregation mechanisms in the Internet of things , 2017 .

[3]  Kim-Kwang Raymond Choo,et al.  Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts , 2017, IEEE Access.

[4]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[5]  Vijander Singh,et al.  An enhanced quantum key distribution protocol for security authentication , 2019, Journal of Discrete Mathematical Sciences and Cryptography.

[6]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[7]  Nima Jafari Navimipour,et al.  Intrusion detection systems in the Internet of things: A comprehensive investigation , 2019, Comput. Networks.

[8]  Victor I. Chang,et al.  Distributed behavior model orchestration in cognitive internet of things solution , 2016, Enterp. Inf. Syst..

[9]  Vijander Singh,et al.  An improved quantum key distribution protocol for verification , 2019, Journal of Discrete Mathematical Sciences and Cryptography.

[10]  Tie Qiu,et al.  Self-organizing and smart protocols for heterogeneous ad hoc networks in the Internet of Things , 2017, Ad hoc networks.

[11]  Engin Leloglu A Review of Security Concerns in Internet of Things , 2017 .

[12]  Klaus Wehrle,et al.  Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[13]  Mamta Agiwal,et al.  Towards Connected Living: 5G Enabled Internet of Things (IoT) , 2019 .

[14]  Wade Trappe,et al.  A Security Framework for the Internet of Things in the Future Internet Architecture , 2017, Future Internet.

[15]  Haider Abbas,et al.  Internet of things (IoT) design considerations for developers and manufacturers , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[16]  Vijay Kumar Jha,et al.  Secure key-distribution in IoT cloud networks , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).

[17]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[18]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[19]  Nima Jafari Navimipour,et al.  Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research , 2017, J. Netw. Comput. Appl..