Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 11 von 10414

Details

Autor(en) / Beteiligte
Titel
A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels
Ist Teil von
  • IEEE access, 2020, Vol.8, p.138406-138446
Ort / Verlag
Piscataway: IEEE
Erscheinungsjahr
2020
Quelle
Free E-Journal (出版社公開部分のみ)
Beschreibungen/Notizen
  • The Internet of Things (IoT) is a transformative technology, which is revolutionizing our everyday life by connecting everyone and everything together. The massive number of devices are preferably connected wirelessly because of the easy installment and flexible deployment. However, the broadcast nature of the wireless medium makes the information accessible to everyone including malicious users, which should hence be protected by encryption. Unfortunately, the secure and efficient provision of cryptographic keys for low-cost IoT devices is challenging; weak keys have resulted in severe security breaches, as evidenced by numerous notorious cyberattacks. This paper provides a comprehensive survey of lightweight security solutions conceived for IoT, relying on key generation from wireless channels. We first introduce the key generation fundamentals and protocols. We then examine how to apply this emerging technique to secure IoT and demonstrate that key generation relying on the randomness of wireless channels is eminently suitable for IoT. This paper reviews the extensive research efforts in the areas of theoretical modelling, simulation based validation and experimental exploration. We finally discuss the hurdles and challenges that key generation is facing and suggest future work to make key generation a reliable and secure solution to safeguard the IoT.
Sprache
Englisch
Identifikatoren
ISSN: 2169-3536
eISSN: 2169-3536
DOI: 10.1109/ACCESS.2020.3012006
Titel-ID: cdi_doaj_primary_oai_doaj_org_article_4ba1727fa4b046d5a31b1fd1ec923ff6

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX