A key management scheme for establishing an encryption-based trusted IoT system

Quazi Mamun, Muhammad Rana

Research output: Book chapter/Published conference paperConference paper

Abstract

In IoT environments, where security and safety are paramount, an encryption-based root of trust provides the strongest means to establish and maintain authenticity, integrity, confidentiality, privacy, and availability. Digital certificates issued from a trusted public key infrastructure provide a proven mechanism for this. However the storage and processing demands of traditional encryption keys have driven some to favour lightweight cryptography. In this situation, we propose a lightweight but robust key management scheme with much smaller key sizes, and its operations require significantly less processing, making it appropriate for devices with less storage space, processing power and battery life.

Original languageEnglish
Title of host publicationProceedings - 4th IEEE/ACM Conference on Connected Health
Subtitle of host publicationApplications, Systems and Engineering Technologies, CHASE 2019
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages41-46
Number of pages6
ISBN (Electronic)9781728146874
DOIs
Publication statusPublished - Nov 2019
Event4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019 - Washington, United States
Duration: 25 Sep 201927 Sep 2019
https://conferences.computer.org/chase2019/
https://conferences.computer.org/chase2019/program.html (conference program)
https://ieeexplore.ieee.org/xpl/conhome/8905987/proceeding (conference proceedings)

Publication series

NameProceedings - 4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019

Conference

Conference4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019
CountryUnited States
CityWashington
Period25/09/1927/09/19
Internet address

Fingerprint Dive into the research topics of 'A key management scheme for establishing an encryption-based trusted IoT system'. Together they form a unique fingerprint.

Cite this