Abstract
The Internet of Things (IoT) faces a variety of challenges and issues in administering security due to its heterogeneous nature and open communication medium. The fundamental security requirement of authentication is expected to secure the communication between the devices from anonymous access. In this article, we present a Distributed Time-Dependent Key Management (DTKM) technique for securing the communication sessions of the IoT devices. This key management technique considers the communication time and interval of the devices independently to generate session keys for authentication. Key management is preceded by the consideration of request authentication and resource utilization. Based on the communication time session, the validity of the keys is determined and is updated with the current random number consideration for authentication. This helps to prevent unnecessary exploitation of storage and also reduces computation time.
Keywords: Distributed security, IoT, key management, message authentication, session key, cloud, security Server.
Graphical Abstract
[http://dx.doi.org/10.1109/ACCESS.2017.2744677]
[http://dx.doi.org/10.1109/COMST.2015.2444095]
[http://dx.doi.org/10.1145/2753476.2753477]
[http://dx.doi.org/10.1109/MCOM.2017.1600363CM]
[http://dx.doi.org/10.1145/3084041.3084061]
[http://dx.doi.org/10.1109/TCAD.2014.2370531]
[http://dx.doi.org/10.1109/MDAT.2016.2544845]
[http://dx.doi.org/10.1016/j.adhoc.2013.05.009]
[http://dx.doi.org/10.1109/ACCESS.2015.2474705]