Article
Dynamic Clustering for IoT Key Management in Hostile Application Area
Lecture Notes in Networks and Systems
Document Type
Article
Publication Date
1-1-2019
Abstract
© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays researchers, some of them made assumptions regarding the use of clustering in their key management schemes. For example, in CL-EKM (Certificateless Effective Key Management) protocol, cluster-heads are assumed to be with high-processing capabilities and deployed within a grid topology. In fact, this is only possible in a controlled environment. In a hostile environment, such as battlefields, this assumption cannot be satisfied. In this work, an enhancement of the CL-EKM scheme has been proposed by introducing a distributed clustering algorithm. The performance of the implemented and enhanced system proved our assumptions.
DOI Link
10.1007/978-3-319-98352-3_6
Publisher
Springer International Publishing
Disciplines
Keywords
- Certificate-Less Effective Key Management (CL-EKM),
- Certificate-less public key cryptography,
- Clustering,
- Dynamic networks,
- Elliptic curve cryptography (ECC),
- Internet of Things (IOT) security,
- Key management,
- Mobility
Scopus ID
85063136689
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1007/978-3-319-98352-3_6
Citation Information
Soumaya Souaidi, Tayeb Kenaza, Badis Djamaa and Monther Aldwairi. "Dynamic Clustering for IoT Key Management in Hostile Application Area" Lecture Notes in Networks and Systems Vol. 50 (2019) p. 48 - 56 ISSN: <a href="https://v2.sherpa.ac.uk/id/publication/issn/2367-3389" target="_blank">2367-3389</a> Available at: http://works.bepress.com/monther-aldwairi/13/