Skip to main content
Article
Dynamic Clustering for IoT Key Management in Hostile Application Area
Lecture Notes in Networks and Systems
  • Soumaya Souaidi, Ecole Militaire Polytechnique
  • Tayeb Kenaza, Ecole Militaire Polytechnique
  • Badis Djamaa, Ecole Militaire Polytechnique
  • Monther Aldwairi, Zayed University
Document Type
Article
Publication Date
1-1-2019
Abstract

© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays researchers, some of them made assumptions regarding the use of clustering in their key management schemes. For example, in CL-EKM (Certificateless Effective Key Management) protocol, cluster-heads are assumed to be with high-processing capabilities and deployed within a grid topology. In fact, this is only possible in a controlled environment. In a hostile environment, such as battlefields, this assumption cannot be satisfied. In this work, an enhancement of the CL-EKM scheme has been proposed by introducing a distributed clustering algorithm. The performance of the implemented and enhanced system proved our assumptions.

Publisher
Springer International Publishing
Disciplines
Keywords
  • Certificate-Less Effective Key Management (CL-EKM),
  • Certificate-less public key cryptography,
  • Clustering,
  • Dynamic networks,
  • Elliptic curve cryptography (ECC),
  • Internet of Things (IOT) security,
  • Key management,
  • Mobility
Scopus ID
85063136689
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1007/978-3-319-98352-3_6
Citation Information
Soumaya Souaidi, Tayeb Kenaza, Badis Djamaa and Monther Aldwairi. "Dynamic Clustering for IoT Key Management in Hostile Application Area" Lecture Notes in Networks and Systems Vol. 50 (2019) p. 48 - 56 ISSN: <a href="https://v2.sherpa.ac.uk/id/publication/issn/2367-3389" target="_blank">2367-3389</a>
Available at: http://works.bepress.com/monther-aldwairi/13/