Securing the Internet of Things Devices Using Pre-Distributed Keys

El Hajjar, A. 2016. Securing the Internet of Things Devices Using Pre-Distributed Keys. 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/IC2EW.2016.22

TitleSecuring the Internet of Things Devices Using Pre-Distributed Keys
AuthorsEl Hajjar, A.
TypeConference paper
Abstract

Abstract:
The paper outlines the state of the art, problems and challenges in the Internet of things (IoT) security. It investigates how the key pre-distribution algorithm of Eschenauer and Giglor designed for Distributed Sensor Networks(DSN) performs when applied on the IoT for 6LoWPAN networks. A simulation that uses the Contiki Operating System was developed in order to explore the performance of the algorithm on those devices. After an explanation of the research methodology and the details of the experiment conducted, we present the results from the experiment in comparison with the results obtained by Eschenauer & Giglor.

KeywordsInternet of things, Routing, Security, Routing protocols, Wireless sensor networks
Year2016
Conference2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW)
PublisherIEEE
Accepted author manuscript
Publication dates
Published04 Aug 2016
Book title2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW)
ISBN9781509036844
Digital Object Identifier (DOI)https://doi.org/10.1109/IC2EW.2016.22
Web address (URL) of conference proceedingshttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7517739
Web address (URL)http://ieeexplore.ieee.org/document/7527845/?part=1

Related outputs

Wireless Networks Cyber Security Threats and Countermeasures
El Hajjar, A. and Jahankhani, H. El Hajjar, A. and Jahankhani, H. (ed.) 2023. Wireless Networks Cyber Security Threats and Countermeasures. Switzerland Springer.

Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations
El Hajjar, A. 2023. Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations. in: Wireless Networks: Cyber Security Threats and Countermeasures Switzerland Springer. pp. 1-42

A proactive approach to protect cloud computing environment against DDoS attack
Md. Mamun Ahmed and Ayman El Hajjar 2023. A proactive approach to protect cloud computing environment against DDoS attack. in: Hamid Jahankhani, Arshad Jamal and Guy Brown (ed.) AI, Blockchain and Self-Sovereign Identity in Higher Education Switzerland Springer. pp. 243-278

Secure routing in IoT networks with SISLOF
El Hajjar, A.E., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. 2017 Global Internet of Things Summit (GIoTS). CICG, Geneva 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/giots.2017.8016278

Secure routing in IoT networks with SISLOF
El Hajjar, A., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. Global IoT Summit. Geneva, Switzerland 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/GIOTS.2017.8016278

Securing the internet of things devices using pre-distributed keys
El Hajjar, A. 2016. Securing the internet of things devices using pre-distributed keys. 2016 IEEE International Conference on Cloud Engineering Workshops (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/ic2ew.2016.22

On the Performance of Key Pre-distribution for RPL-based IoT Networks
El Hajjar, A., Roussos, G. and Paterson, M. 2016. On the Performance of Key Pre-distribution for RPL-based IoT Networks. Interoperability, Safety and Security in IoT. Paris, France 26 - 27 Oct 2016 Springer. https://doi.org/10.1007/978-3-319-52727-7_9

Permalink - https://westminsterresearch.westminster.ac.uk/item/q1q38/securing-the-internet-of-things-devices-using-pre-distributed-keys


Share this

Usage statistics

109 total views
240 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.