Dynamic Clustering for IoT Key Management in Hostile Application Area

Document Type

Article

Source of Publication

Lecture Notes in Networks and Systems

Publication Date

1-1-2019

Abstract

© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays researchers, some of them made assumptions regarding the use of clustering in their key management schemes. For example, in CL-EKM (Certificateless Effective Key Management) protocol, cluster-heads are assumed to be with high-processing capabilities and deployed within a grid topology. In fact, this is only possible in a controlled environment. In a hostile environment, such as battlefields, this assumption cannot be satisfied. In this work, an enhancement of the CL-EKM scheme has been proposed by introducing a distributed clustering algorithm. The performance of the implemented and enhanced system proved our assumptions.

ISSN

2367-3389

Publisher

Springer International Publishing

Volume

50

First Page

48

Last Page

56

Disciplines

Computer Sciences

Keywords

Certificate-Less Effective Key Management (CL-EKM), Certificate-less public key cryptography, Clustering, Dynamic networks, Elliptic curve cryptography (ECC), Internet of Things (IOT) security, Key management, Mobility

Scopus ID

85063136689

Indexed in Scopus

yes

Open Access

no

Share

COinS