Secure and Efficient Key Management for Dynamic Network Topologies in IoT

Authors

  • Dr.Zubair Ahmed Khan Assistant Professor, Department of Computer Science & Engineering, MATS School of Engineering & IT,MATS UNIVERSITY, Aarang & Raipur
  • Prof (Dr.) Asha Ambhaikar Professor, Department of Computer Science & Engineering MATS School of Engineering & IT, MATS UNIVERSITY Aarang & Raipur

DOI:

https://doi.org/10.59367/hb0gyk02

Keywords:

Internet of Things, Key Management, Secure Communication, Dynamic Network Topologies, Scalability, Resource-Constrained Systems, Data Integrity

Abstract

The rapid expansion of the Internet of Things (IoT) has resulted in a significant increase in the number of interconnected devices, leading to highly dynamic and complex network topologies. This evolution introduces critical security vulnerabilities, particularly in ensuring secure communication. Effective key management is pivotal in mitigating these risks and safeguarding data integrity within such networks. This study systematically examines the challenges associated with secure and efficient key management in dynamic IoT environments. Existing methodologies are analyzed to identify their limitations, and an innovative framework is proposed to enhance security while preserving operational efficiency. The proposed framework addresses the unique requirements of IoT networks, including scalability, adaptability, and resource constraints, offering a comprehensive approach to improving key management practices.

References

1. D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM Journal on Computing, vol. 32, no. 3, pp. 586-615, 2003.

2. L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 41-47.

3. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.

4. M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution," in Advances in Cryptology - CRYPTO'93, 1993, pp. 232-249.

5. C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.

6. This paper presents a comprehensive framework for secure and efficient key management tailored to the unique challenges of dynamic IoT networks, paving the way for more resilient and scalable IoT deployments.

Downloads

Published

2024-12-02 — Updated on 2024-12-22

Versions

Issue

Section

Articles

How to Cite

Secure and Efficient Key Management for Dynamic Network Topologies in IoT. (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(2), 17-20. https://doi.org/10.59367/hb0gyk02 (Original work published 2024)

Similar Articles

1-10 of 95

You may also start an advanced similarity search for this article.