• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种高效的物联网密钥管理技术。

An Efficient Key Management Technique for the Internet of Things.

作者信息

Tabassum Tamanna, Hossain S K Alamgir, Rahman Md Anisur, Alhamid Mohammed F, Hossain M Anwar

机构信息

Computer Science and Engineering Discipline, Khulna University, Khulna-9208, Bangladesh.

Research Chair of Smart Technologies, King Saud University, Riyadh 11543, Saudi Arabia.

出版信息

Sensors (Basel). 2020 Apr 6;20(7):2049. doi: 10.3390/s20072049.

DOI:10.3390/s20072049
PMID:32268487
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7181291/
Abstract

The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies, and industrial partners are driving us to use IoT. Although IoT provides new opportunities, security remains a key concern while providing various services. It is especially challenging how the data generated from IoT devices can be protected from potential security attacks and how to safeguard the exchange of these data while transiting through different nodes and gateways. In this research, we aim to ensure a safe IoT environment by proposing an efficient key management technique that uses a combination of symmetric and asymmetric cryptosystem to obtain the speed of the former as well as the security benefits of the latter. Our proposal considers a set of Smart Objects (SO) capable of key registration, generation and distribution for IoT data transmission. We used the open-source Message Queuing Telemetry Transport (MQTT) protocol to facilitate communications between the source and the destination nodes. The suitability of the proposed approach is measured experimentally and the results are comparable to existing works with respect to key conversion time, algorithm execution time, number of reuse connections, and bandwidth utilization.

摘要

物联网(IoT)已经极大地改变了我们的生活。客户、监管机构和行业合作伙伴正推动我们使用物联网。尽管物联网提供了新的机遇,但在提供各种服务时,安全仍然是一个关键问题。尤其具有挑战性的是,如何保护物联网设备生成的数据免受潜在的安全攻击,以及如何在数据通过不同节点和网关传输时保障这些数据的交换安全。在本研究中,我们旨在通过提出一种高效的密钥管理技术来确保安全的物联网环境,该技术结合了对称和非对称密码系统,以获得前者的速度以及后者的安全优势。我们的提议考虑了一组能够为物联网数据传输进行密钥注册、生成和分发的智能对象(SO)。我们使用开源的消息队列遥测传输(MQTT)协议来促进源节点和目的节点之间的通信。通过实验测量了所提方法的适用性,并且在密钥转换时间、算法执行时间、重用连接数和带宽利用率方面,结果与现有工作具有可比性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/38b53c5a9683/sensors-20-02049-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/d734d0459c4d/sensors-20-02049-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/5d933104762e/sensors-20-02049-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/9e4d5b87d83d/sensors-20-02049-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/d5bebeb5335d/sensors-20-02049-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/dc8d76428c00/sensors-20-02049-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/d38b4d113004/sensors-20-02049-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/272118ee7a79/sensors-20-02049-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/082b88e5f7e9/sensors-20-02049-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/32517f710a80/sensors-20-02049-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/1ec72dfb0c6f/sensors-20-02049-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/f612867881d4/sensors-20-02049-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/c503d6638851/sensors-20-02049-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/e7a533695b40/sensors-20-02049-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/65938b4b9af0/sensors-20-02049-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/542c3a3bb5a4/sensors-20-02049-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/b7e1ee89e1e8/sensors-20-02049-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/2ad357174de0/sensors-20-02049-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/590843eec17c/sensors-20-02049-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/99a34cc8440c/sensors-20-02049-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/38b53c5a9683/sensors-20-02049-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/d734d0459c4d/sensors-20-02049-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/5d933104762e/sensors-20-02049-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/9e4d5b87d83d/sensors-20-02049-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/d5bebeb5335d/sensors-20-02049-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/dc8d76428c00/sensors-20-02049-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/d38b4d113004/sensors-20-02049-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/272118ee7a79/sensors-20-02049-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/082b88e5f7e9/sensors-20-02049-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/32517f710a80/sensors-20-02049-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/1ec72dfb0c6f/sensors-20-02049-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/f612867881d4/sensors-20-02049-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/c503d6638851/sensors-20-02049-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/e7a533695b40/sensors-20-02049-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/65938b4b9af0/sensors-20-02049-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/542c3a3bb5a4/sensors-20-02049-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/b7e1ee89e1e8/sensors-20-02049-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/2ad357174de0/sensors-20-02049-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/590843eec17c/sensors-20-02049-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/99a34cc8440c/sensors-20-02049-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77b6/7181291/38b53c5a9683/sensors-20-02049-g021.jpg

相似文献

1
An Efficient Key Management Technique for the Internet of Things.一种高效的物联网密钥管理技术。
Sensors (Basel). 2020 Apr 6;20(7):2049. doi: 10.3390/s20072049.
2
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment.物联网系统在 MQTT 环境中的加密密钥分配系统。
Sensors (Basel). 2023 May 26;23(11):5102. doi: 10.3390/s23115102.
3
Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.基于将通信过程建模为资源的物联网环境访问控制机制
Sensors (Basel). 2018 Mar 20;18(3):917. doi: 10.3390/s18030917.
4
MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices.MUP:借助MQTT简化受限物联网设备的安全空中更新
Sensors (Basel). 2020 Dec 22;21(1):10. doi: 10.3390/s21010010.
5
A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures.基于具有受限硬件和开源基础设施的物联网的分布式测量系统安全协议性能分析
Sensors (Basel). 2024 Apr 26;24(9):2781. doi: 10.3390/s24092781.
6
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.使用物联网入侵检测系统预防MQTT漏洞
Sensors (Basel). 2022 Jan 12;22(2):567. doi: 10.3390/s22020567.
7
DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications.DM-MQTT:一种基于 SDN 组播的高效 MQTT 协议,用于大规模物联网通信。
Sensors (Basel). 2018 Sep 12;18(9):3071. doi: 10.3390/s18093071.
8
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro.用于保障智能农业中物联网无线传感器网络安全的分布式密钥管理
Sensors (Basel). 2020 Apr 15;20(8):2242. doi: 10.3390/s20082242.
9
Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments.用于在物联网环境中保障MQTT协议安全的有效特征工程框架。
Sensors (Basel). 2024 Mar 10;24(6):1782. doi: 10.3390/s24061782.
10
Cryptographic Keys Generating and Renewing System for IoT Network Nodes-A Concept.物联网网络节点的加密密钥生成与更新系统——概念
Sensors (Basel). 2020 Sep 3;20(17):5012. doi: 10.3390/s20175012.

引用本文的文献

1
Security and Privacy Techniques in IoT Environment.物联网环境中的安全和隐私技术。
Sensors (Basel). 2020 Dec 22;21(1):1. doi: 10.3390/s21010001.

本文引用的文献

1
Chaotic Image Encryption Using Hopfield and Hindmarsh-Rose Neurons Implemented on FPGA.基于 FPGA 的 Hopfield 和 Hindmarsh-Rose 神经元混沌图像加密。
Sensors (Basel). 2020 Feb 28;20(5):1326. doi: 10.3390/s20051326.
2
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.面向舒适生活方式的安全物联网技术中的相互认证方案。
Sensors (Basel). 2015 Dec 24;16(1):20. doi: 10.3390/s16010020.
3
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.用于异构物联网设备间安全通信的优化椭圆曲线密码学实现
Sensors (Basel). 2015 Aug 28;15(9):21478-99. doi: 10.3390/s150921478.