Dynamic Clustering for IoT Key Management in Hostile Application Area
Document Type
Article
Source of Publication
Lecture Notes in Networks and Systems
Publication Date
1-1-2019
Abstract
© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays researchers, some of them made assumptions regarding the use of clustering in their key management schemes. For example, in CL-EKM (Certificateless Effective Key Management) protocol, cluster-heads are assumed to be with high-processing capabilities and deployed within a grid topology. In fact, this is only possible in a controlled environment. In a hostile environment, such as battlefields, this assumption cannot be satisfied. In this work, an enhancement of the CL-EKM scheme has been proposed by introducing a distributed clustering algorithm. The performance of the implemented and enhanced system proved our assumptions.
DOI Link
ISSN
Publisher
Springer International Publishing
Volume
50
First Page
48
Last Page
56
Disciplines
Computer Sciences
Keywords
Certificate-Less Effective Key Management (CL-EKM), Certificate-less public key cryptography, Clustering, Dynamic networks, Elliptic curve cryptography (ECC), Internet of Things (IOT) security, Key management, Mobility
Scopus ID
Recommended Citation
Souaidi, Soumaya; Kenaza, Tayeb; Djamaa, Badis; and Aldwairi, Monther, "Dynamic Clustering for IoT Key Management in Hostile Application Area" (2019). All Works. 1344.
https://zuscholars.zu.ac.ae/works/1344
Indexed in Scopus
yes
Open Access
no