Utilize este identificador para referenciar este registo: https://hdl.handle.net/10316/101582
Título: A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
Autor: Malik, Manisha
Dutta, Maitreyee
Granjal, Jorge 
Palavras-chave: Authentication; Internet of Things; key bootstrapping; key management; public key cryptography; security
Data: 2019
Projeto: MobiWise project (P2020 SAICTPAC/0011/2015) 
COMPETE 2020 
Portugal 2020 - Operational Program for Competitiveness and Internationalization (POCI) 
European Union European Regional Development Fund (ERDF) 
Portuguese Foundation for Science and Technology (FCT) 
Título da revista, periódico, livro ou evento: IEEE Access
Volume: 7
Resumo: The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others. The explosive growth of Internet-connected sensing and actuating devices has bridged the gap between the physical and the digital world, with new solutions bringing bene ts to people, processes, and businesses. However, security will be a major challenge in enabling most of such applications. The lack of secure links exposes data exchanged by devices to theft and attacks, with hackers already showing a keen interest in this area. Secure communication in the IoT will require a multifaceted approach, in particular, targeting aspects as relevant as the communications' protocols and data that need to be secured. One of the major aspects among these is how keys are bootstrapped in devices, for the purpose of supporting secure communications. In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things. Due to its inherent scalability, such protocols are particularly relevant for the implementation of distributed identity and trust management mechanisms on the IoT, in the context of which devices may be authenticated and trusted. The reviewed proposals are analyzed and classi ed on the basis of the key delivery method, the underlying cryptographic primitive, and the authentication mechanism supported.We also identify and discuss the main challenges of implementing such methods in the context of IoT applications and devices, together with the main avenues for conducting further research in the area.
URI: https://hdl.handle.net/10316/101582
ISSN: 2169-3536
DOI: 10.1109/ACCESS.2019.2900957
Direitos: openAccess
Aparece nas coleções:I&D CISUC - Artigos em Revistas Internacionais

Ficheiros deste registo:
Mostrar registo em formato completo

Citações SCOPUSTM   

42
Visto em 17/nov/2022

Citações WEB OF SCIENCETM

27
Visto em 2/mai/2023

Visualizações de página

77
Visto em 17/jul/2024

Downloads

104
Visto em 17/jul/2024

Google ScholarTM

Verificar

Altmetric

Altmetric


Este registo está protegido por Licença Creative Commons Creative Commons