Cryptographic Keys Generating and Renewing System for IoT Network Nodes-A Concept

被引:5
作者
Furtak, Janusz [1 ]
机构
[1] Mil Univ Technol, Fac Cybernet, PL-00908 Warsaw, Poland
关键词
key distribution system; cryptographic keys renewing; security in IoT; Trusted Platform Module; MQTT secure data exchange; MANAGEMENT;
D O I
10.3390/s20175012
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Designers and users of the Internet of Things (IoT) are devoting more and more attention to the issues of security and privacy as well as the integration of data coming from various areas. A critical element of cooperation is building mutual trust and secure data exchange. Because IoT devices usually have small memory resources, limited computing power, and limited energy resources, it is often impossible to effectively use a well-known solution based on the Certification Authority. This article describes the concept of the system for a cryptographic Key Generating and Renewing system (KGR). The concept of the solution is based on the use of the hardware Trusted Platform Module (TPM) v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes. The main tasks of the system are the secure distribution of a new symmetric key and renewal of an expired key for data exchange parties. The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems. A service based on the Message Queuing Telemetry Transport (MQTT) protocol will be used to exchange data between nodes of the KGR system.
引用
收藏
页码:1 / 30
页数:31
相关论文
共 30 条
  • [1] Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups
    Abdmeziem, Mohammed Riyadh
    Charoy, Francois
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 320 - 338
  • [2] A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK)
    Abdmeziem, Mohammed Riyadh
    Tandjaoui, Djamel
    Romdhani, Imed
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1110 - 1118
  • [3] [Anonymous], 2006, EMBEDDED TECHNOLOGY
  • [4] [Anonymous], 2011, TPM MAIN 1
  • [5] Barker E., 2007, Tech. rep. Special Publication 800-57 Part 1, DOI DOI 10.6028/NIST.SP.800-57P1R2007
  • [6] Bormann C., 2014, TERMINOLOGY CONSTRAI, P2070
  • [8] Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
    Dammak, Maissa
    Senouci, Sidi-Mohammed
    Messous, Mohamed Ayoub
    Elhdhili, Mohamed Houcine
    Gransart, Christophe
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1742 - 1757
  • [9] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [10] An Extended Framework of Privacy-Preserving Computation With Flexible Access Control
    Ding, Wenxiu
    Hu, Rui
    Yan, Zheng
    Qian, Xinren
    Deng, Robert H.
    Yang, Laurence T.
    Dong, Mianxiong
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 918 - 930